2025-03-06 11:52:21,045 - xtesting.ci.run_tests - INFO - Deployment description: +-------------------------+------------------------------------------------------------+ | ENV VAR | VALUE | +-------------------------+------------------------------------------------------------+ | CI_LOOP | daily | | DEBUG | false | | DEPLOY_SCENARIO | k8-nosdn-nofeature-noha | | INSTALLER_TYPE | unknown | | BUILD_TAG | 1AXKXXH5CIP0 | | NODE_NAME | v1.32 | | TEST_DB_URL | http://testresults.opnfv.org/test/api/v1/results | | TEST_DB_EXT_URL | http://testresults.opnfv.org/test/api/v1/results | | S3_ENDPOINT_URL | https://storage.googleapis.com | | S3_DST_URL | s3://artifacts.opnfv.org/functest- | | | kubernetes/1AXKXXH5CIP0/functest-kubernetes-opnfv- | | | functest-kubernetes-cnf-v1.32-cnf_testsuite-run-14 | | HTTP_DST_URL | http://artifacts.opnfv.org/functest- | | | kubernetes/1AXKXXH5CIP0/functest-kubernetes-opnfv- | | | functest-kubernetes-cnf-v1.32-cnf_testsuite-run-14 | +-------------------------+------------------------------------------------------------+ 2025-03-06 11:52:21,060 - xtesting.ci.run_tests - INFO - Loading test case 'cnf_testsuite'... 2025-03-06 11:52:21,412 - xtesting.ci.run_tests - INFO - Running test case 'cnf_testsuite'... 2025-03-06 11:52:32,032 - functest_kubernetes.cnf_conformance.conformance - INFO - cnf-testsuite setup -l debug CNF TestSuite version: v1.4.1 Successfully created directories for cnf-testsuite I, [2025-03-06 11:52:21 UTC #7] INFO -- cnf-testsuite: VERSION: v1.4.1 D, [2025-03-06 11:52:21 UTC #7] DEBUG -- cnf-testsuite: helm_v3?: BuildInfo{Version:"v3.6.0", GitCommit:"7f2df6467771a75f5646b7f12afb408590ed1755", GitTreeState:"clean", GoVersion:"go1.16.3" I, [2025-03-06 11:52:21 UTC #7] INFO -- cnf-testsuite: Globally installed helm satisfies required version. Skipping local helm install. Global helm found. Version: v3.6.0 D, [2025-03-06 11:52:21 UTC #7] DEBUG -- cnf-testsuite: helm_v2?: D, [2025-03-06 11:52:21 UTC #7] DEBUG -- cnf-testsuite: helm_v3?: BuildInfo{Version:"v3.6.0", GitCommit:"7f2df6467771a75f5646b7f12afb408590ed1755", GitTreeState:"clean", GoVersion:"go1.16.3" I, [2025-03-06 11:52:21 UTC #7] INFO -- cnf-testsuite: helm_local_version command: /home/xtesting/.cnf-testsuite/tools/helm/linux-amd64/helm version No Local helm version found D, [2025-03-06 11:52:21 UTC #7] DEBUG -- cnf-testsuite: helm_local_version output: I, [2025-03-06 11:52:21 UTC #7] INFO -- cnf-testsuite: helm_local_version stderr: sh: line 0: /home/xtesting/.cnf-testsuite/tools/helm/linux-amd64/helm: not found D, [2025-03-06 11:52:21 UTC #7] DEBUG -- cnf-testsuite: helm_v2?: D, [2025-03-06 11:52:21 UTC #7] DEBUG -- cnf-testsuite: helm_v3?: D, [2025-03-06 11:52:21 UTC #7] DEBUG -- cnf-testsuite: helm_v3?: BuildInfo{Version:"v3.6.0", GitCommit:"7f2df6467771a75f5646b7f12afb408590ed1755", GitTreeState:"clean", GoVersion:"go1.16.3" I, [2025-03-06 11:52:21 UTC #7] INFO -- cnf-testsuite: error: I, [2025-03-06 11:52:21 UTC #7] INFO -- cnf-testsuite: helm_resp (add): NAME NAMESPACE REVISION UPDATED STATUS CHART APP VERSION Global kubectl found. Version: 1.32 No Local kubectl version found Global git found. Version: 2.45.3 No Local git version found All prerequisites found. KUBECONFIG is set as /home/xtesting/.kube/config. I, [2025-03-06 11:52:21 UTC #7] INFO -- cnf-testsuite: command: kubectl get nodes --kubeconfig=/home/xtesting/.kube/config D, [2025-03-06 11:52:21 UTC #7] DEBUG -- cnf-testsuite: output: NAME STATUS ROLES AGE VERSION v132-control-plane Ready control-plane 34d v1.32.0 v132-worker Ready 34d v1.32.0 v132-worker2 Ready 34d v1.32.0 I, [2025-03-06 11:52:21 UTC #7] INFO -- cnf-testsuite: KubectlClient::Create.namespace command: kubectl create namespace cnf-testsuite Created cnf-testsuite namespace on the Kubernetes cluster D, [2025-03-06 11:52:21 UTC #7] DEBUG -- cnf-testsuite: KubectlClient::Create.namespace output: namespace/cnf-testsuite created I, [2025-03-06 11:52:21 UTC #7] INFO -- cnf-testsuite-Label.namespace: command: kubectl label namespace cnf-testsuite pod-security.kubernetes.io/enforce=privileged D, [2025-03-06 11:52:22 UTC #7] DEBUG -- cnf-testsuite-Label.namespace: output: namespace/cnf-testsuite labeled I, [2025-03-06 11:52:22 UTC #7] INFO -- cnf-testsuite-verbose: install_apisnoop I, [2025-03-06 11:52:22 UTC #7] INFO -- cnf-testsuite: GitClient.clone command: https://github.com/cncf/apisnoop /home/xtesting/.cnf-testsuite/tools/apisnoop I, [2025-03-06 11:52:29 UTC #7] INFO -- cnf-testsuite: GitClient.clone output: I, [2025-03-06 11:52:29 UTC #7] INFO -- cnf-testsuite: GitClient.clone stderr: Cloning into '/home/xtesting/.cnf-testsuite/tools/apisnoop'... I, [2025-03-06 11:52:29 UTC #7] INFO -- cnf-testsuite: url: https://github.com/vmware-tanzu/sonobuoy/releases/download/v0.56.14/sonobuoy_0.56.14_linux_amd64.tar.gz I, [2025-03-06 11:52:29 UTC #7] INFO -- cnf-testsuite: write_file: /home/xtesting/.cnf-testsuite/tools/sonobuoy/sonobuoy.tar.gz I, [2025-03-06 11:52:29 UTC #7] INFO -- cnf-testsuite: download: https://github.com/vmware-tanzu/sonobuoy/releases/download/v0.56.14/sonobuoy_0.56.14_linux_amd64.tar.gz, /home/xtesting/.cnf-testsuite/tools/sonobuoy/sonobuoy.tar.gz I, [2025-03-06 11:52:29 UTC #7] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:52:29 UTC #7] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:52:29 UTC #7] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:52:29 UTC #7] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:52:29 UTC #7] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:52:29 UTC #7] INFO -- cnf-testsuite: KernelIntrospection.os_release_id: alpine I, [2025-03-06 11:52:29 UTC #7] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:52:29 UTC #7] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:52:29 UTC #7] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:52:29 UTC #7] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:52:29 UTC #7] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:52:29 UTC #7] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:52:29 UTC #7] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:52:29 UTC #7] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:52:29 UTC #7] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:52:29 UTC #7] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:52:29 UTC #7] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:52:29 UTC #7] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:52:29 UTC #7] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:52:29 UTC #7] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:52:29 UTC #7] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:52:29 UTC #7] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:52:29 UTC #7] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:52:29 UTC #7] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:52:29 UTC #7] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:52:29 UTC #7] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:52:29 UTC #7] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:52:29 UTC #7] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:52:29 UTC #7] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:52:29 UTC #7] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:52:29 UTC #7] INFO -- cnf-testsuite: release_id: alpine D, [2025-03-06 11:52:29 UTC #7] DEBUG -- cnf-testsuite-http.client: Performing request D, [2025-03-06 11:52:29 UTC #7] DEBUG -- cnf-testsuite-http.client: Performing request I, [2025-03-06 11:52:30 UTC #7] INFO -- cnf-testsuite: response status: 200 I, [2025-03-06 11:52:31 UTC #7] INFO -- cnf-testsuite: install_kind I, [2025-03-06 11:52:31 UTC #7] INFO -- cnf-testsuite: write_file: /home/xtesting/.cnf-testsuite/tools/kind/kind I, [2025-03-06 11:52:31 UTC #7] INFO -- cnf-testsuite: install kind I, [2025-03-06 11:52:31 UTC #7] INFO -- cnf-testsuite: url: https://github.com/kubernetes-sigs/kind/releases/download/v0.17.0/kind-linux-amd64 I, [2025-03-06 11:52:31 UTC #7] INFO -- cnf-testsuite: download: https://github.com/kubernetes-sigs/kind/releases/download/v0.17.0/kind-linux-amd64, /home/xtesting/.cnf-testsuite/tools/kind/kind I, [2025-03-06 11:52:31 UTC #7] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:52:31 UTC #7] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:52:31 UTC #7] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:52:31 UTC #7] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:52:31 UTC #7] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:52:31 UTC #7] INFO -- cnf-testsuite: KernelIntrospection.os_release_id: alpine I, [2025-03-06 11:52:31 UTC #7] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:52:31 UTC #7] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:52:31 UTC #7] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:52:31 UTC #7] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:52:31 UTC #7] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:52:31 UTC #7] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:52:31 UTC #7] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:52:31 UTC #7] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:52:31 UTC #7] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:52:31 UTC #7] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:52:31 UTC #7] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:52:31 UTC #7] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:52:31 UTC #7] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:52:31 UTC #7] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:52:31 UTC #7] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:52:31 UTC #7] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:52:31 UTC #7] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:52:31 UTC #7] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:52:31 UTC #7] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:52:31 UTC #7] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:52:31 UTC #7] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:52:31 UTC #7] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:52:31 UTC #7] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:52:31 UTC #7] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:52:31 UTC #7] INFO -- cnf-testsuite: release_id: alpine D, [2025-03-06 11:52:31 UTC #7] DEBUG -- cnf-testsuite-http.client: Performing request D, [2025-03-06 11:52:31 UTC #7] DEBUG -- cnf-testsuite-http.client: Performing request I, [2025-03-06 11:52:31 UTC #7] INFO -- cnf-testsuite: response status: 200 Dependency installation complete 2025-03-06 11:52:52,795 - functest_kubernetes.cnf_conformance.conformance - INFO - cnf-testsuite cnf_install cnf-config=example-cnfs/coredns/cnf-testsuite.yml -l debug Successfully created directories for cnf-testsuite KUBECONFIG is set as /home/xtesting/.kube/config. D, [2025-03-06 11:52:32 UTC #210] DEBUG -- cnf-testsuite: helm_v3?: BuildInfo{Version:"v3.6.0", GitCommit:"7f2df6467771a75f5646b7f12afb408590ed1755", GitTreeState:"clean", GoVersion:"go1.16.3" I, [2025-03-06 11:52:32 UTC #210] INFO -- cnf-testsuite: Globally installed helm satisfies required version. Skipping local helm install. I, [2025-03-06 11:52:32 UTC #210] INFO -- cnf-testsuite: command: kubectl get nodes --kubeconfig=/home/xtesting/.kube/config D, [2025-03-06 11:52:32 UTC #210] DEBUG -- cnf-testsuite: output: NAME STATUS ROLES AGE VERSION v132-control-plane Ready control-plane 34d v1.32.0 v132-worker Ready 34d v1.32.0 v132-worker2 Ready 34d v1.32.0 I, [2025-03-06 11:52:32 UTC #210] INFO -- cnf-testsuite: KubectlClient::Create.namespace command: kubectl create namespace cnf-testsuite cnf-testsuite namespace already exists on the Kubernetes cluster D, [2025-03-06 11:52:32 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Create.namespace output: I, [2025-03-06 11:52:32 UTC #210] INFO -- cnf-testsuite: KubectlClient::Create.namespace stderr: Error from server (AlreadyExists): namespaces "cnf-testsuite" already exists I, [2025-03-06 11:52:32 UTC #210] INFO -- cnf-testsuite-Label.namespace: command: kubectl label --overwrite namespace cnf-testsuite pod-security.kubernetes.io/enforce=privileged D, [2025-03-06 11:52:32 UTC #210] DEBUG -- cnf-testsuite-Label.namespace: output: namespace/cnf-testsuite not labeled I, [2025-03-06 11:52:32 UTC #210] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:52:32 UTC #210] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" I, [2025-03-06 11:52:32 UTC #210] INFO -- cnf-testsuite: find response: [] I, [2025-03-06 11:52:32 UTC #210] INFO -- cnf-testsuite: ClusterTools install I, [2025-03-06 11:52:32 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.namespaces command: kubectl get namespaces -o json D, [2025-03-06 11:52:32 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.namespaces output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Namespace", "metadata": { "creationTimestamp": "2025-03-06T11:52:21Z", "labels": { "kubernetes.io/metadata.name": "cnf-testsuite", "pod-security.kubernetes.io/enforce": "privileged" }, "name": "cnf-testsuite", "resourceVersion": "4961120", "uid": "339d74b5-bae7-4452-9537-637944b57f79" }, "spec": { "finalizers": [ "kubernetes" ] }, "status": { "phase": "Active" } }, { "apiVersion": "v1", "kind": "Namespace", "metadata": { "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "kubernetes.io/metadata.name": "default" }, "name": "default", "resourceVersion": "41", "uid": "582d4c13-470d-46d8-a141-1fe0bacc8254" }, "spec": { "finalizers": [ "kubernetes" ] }, "status": { "phase": "Active" } }, { "apiVersion": "v1", "kind": "Namespace", "metadata": { "creationTimestamp": "2025-03-06T11:44:51Z", "deletionTimestamp": "2025-03-06T11:52:17Z", "generateName": "ims-", "labels": { "kubernetes.io/metadata.name": "ims-27jwv", "pod-security.kubernetes.io/enforce": "baseline" }, "name": "ims-27jwv", "resourceVersion": "4961268", "uid": "36020830-5f11-4669-bc06-3b87e8833da0" }, "spec": { "finalizers": [ "kubernetes" ] }, "status": { "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:22Z", "message": "All resources successfully discovered", "reason": "ResourcesDiscovered", "status": "False", "type": "NamespaceDeletionDiscoveryFailure" }, { "lastTransitionTime": "2025-03-06T11:52:22Z", "message": "All legacy kube types successfully parsed", "reason": "ParsedGroupVersions", "status": "False", "type": "NamespaceDeletionGroupVersionParsingFailure" }, { "lastTransitionTime": "2025-03-06T11:52:22Z", "message": "All content successfully deleted, may be waiting on finalization", "reason": "ContentDeleted", "status": "False", "type": "NamespaceDeletionContentFailure" }, { "lastTransitionTime": "2025-03-06T11:52:22Z", "message": "Some resources are remaining: pods. has 6 resource instances", "reason": "SomeResourcesRemain", "status": "True", "type": "NamespaceContentRemaining" }, { "lastTransitionTime": "2025-03-06T11:52:22Z", "message": "All content-preserving finalizers finished", "reason": "ContentHasNoFinalizers", "status": "False", "type": "NamespaceFinalizersRemaining" } ], "phase": "Terminating" } }, { "apiVersion": "v1", "kind": "Namespace", "metadata": { "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "kubernetes.io/metadata.name": "kube-node-lease" }, "name": "kube-node-lease", "resourceVersion": "65", "uid": "eb770c0e-e101-4c8f-9a8d-46783f79a977" }, "spec": { "finalizers": [ "kubernetes" ] }, "status": { "phase": "Active" } }, { "apiVersion": "v1", "kind": "Namespace", "metadata": { "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "kubernetes.io/metadata.name": "kube-public" }, "name": "kube-public", "resourceVersion": "35", "uid": "5c0fe4a6-8a5e-483c-91c2-5c71550db77b" }, "spec": { "finalizers": [ "kubernetes" ] }, "status": { "phase": "Active" } }, { "apiVersion": "v1", "kind": "Namespace", "metadata": { "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "kubernetes.io/metadata.name": "kube-system" }, "name": "kube-system", "resourceVersion": "12", "uid": "731b18ca-8630-4343-96b2-dcabfb462b9e" }, "spec": { "finalizers": [ "kubernetes" ] }, "status": { "phase": "Active" } }, { "apiVersion": "v1", "kind": "Namespace", "metadata": { "annotations": { "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"local-path-storage\"}}\n" }, "creationTimestamp": "2025-01-31T08:09:11Z", "labels": { "kubernetes.io/metadata.name": "local-path-storage" }, "name": "local-path-storage", "resourceVersion": "288", "uid": "7b1bef67-ca69-4da8-bec4-7a44649be129" }, "spec": { "finalizers": [ "kubernetes" ] }, "status": { "phase": "Active" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:52:32 UTC #210] DEBUG -- cnf-testsuite: ClusterTools ensure_namespace_exists namespace_array: [{"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:21Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-testsuite", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-testsuite", "resourceVersion" => "4961120", "uid" => "339d74b5-bae7-4452-9537-637944b57f79"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:05Z", "labels" => {"kubernetes.io/metadata.name" => "default"}, "name" => "default", "resourceVersion" => "41", "uid" => "582d4c13-470d-46d8-a141-1fe0bacc8254"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-03-06T11:44:51Z", "deletionTimestamp" => "2025-03-06T11:52:17Z", "generateName" => "ims-", "labels" => {"kubernetes.io/metadata.name" => "ims-27jwv", "pod-security.kubernetes.io/enforce" => "baseline"}, "name" => "ims-27jwv", "resourceVersion" => "4961268", "uid" => "36020830-5f11-4669-bc06-3b87e8833da0"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"conditions" => [{"lastTransitionTime" => "2025-03-06T11:52:22Z", "message" => "All resources successfully discovered", "reason" => "ResourcesDiscovered", "status" => "False", "type" => "NamespaceDeletionDiscoveryFailure"}, {"lastTransitionTime" => "2025-03-06T11:52:22Z", "message" => "All legacy kube types successfully parsed", "reason" => "ParsedGroupVersions", "status" => "False", "type" => "NamespaceDeletionGroupVersionParsingFailure"}, {"lastTransitionTime" => "2025-03-06T11:52:22Z", "message" => "All content successfully deleted, may be waiting on finalization", "reason" => "ContentDeleted", "status" => "False", "type" => "NamespaceDeletionContentFailure"}, {"lastTransitionTime" => "2025-03-06T11:52:22Z", "message" => "Some resources are remaining: pods. has 6 resource instances", "reason" => "SomeResourcesRemain", "status" => "True", "type" => "NamespaceContentRemaining"}, {"lastTransitionTime" => "2025-03-06T11:52:22Z", "message" => "All content-preserving finalizers finished", "reason" => "ContentHasNoFinalizers", "status" => "False", "type" => "NamespaceFinalizersRemaining"}], "phase" => "Terminating"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:05Z", "labels" => {"kubernetes.io/metadata.name" => "kube-node-lease"}, "name" => "kube-node-lease", "resourceVersion" => "65", "uid" => "eb770c0e-e101-4c8f-9a8d-46783f79a977"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:05Z", "labels" => {"kubernetes.io/metadata.name" => "kube-public"}, "name" => "kube-public", "resourceVersion" => "35", "uid" => "5c0fe4a6-8a5e-483c-91c2-5c71550db77b"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:05Z", "labels" => {"kubernetes.io/metadata.name" => "kube-system"}, "name" => "kube-system", "resourceVersion" => "12", "uid" => "731b18ca-8630-4343-96b2-dcabfb462b9e"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"local-path-storage\"}}\n"}, "creationTimestamp" => "2025-01-31T08:09:11Z", "labels" => {"kubernetes.io/metadata.name" => "local-path-storage"}, "name" => "local-path-storage", "resourceVersion" => "288", "uid" => "7b1bef67-ca69-4da8-bec4-7a44649be129"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}] I, [2025-03-06 11:52:32 UTC #210] INFO -- cnf-testsuite: KubectlClient::Apply.file command: kubectl apply -n cnf-testsuite -f cluster_tools.yml D, [2025-03-06 11:52:32 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Apply.file output: daemonset.apps/cluster-tools created I, [2025-03-06 11:52:32 UTC #210] INFO -- cnf-testsuite: KubectlClient::Apply.file stderr: Warning: would violate PodSecurity "restricted:latest": host namespaces (hostNetwork=true, hostPID=true), privileged (container "cluster-tools" must not set securityContext.privileged=true), allowPrivilegeEscalation != false (container "cluster-tools" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "cluster-tools" must set securityContext.capabilities.drop=["ALL"]), restricted volume types (volumes "containerd-volume", "proc", "dockerd-volume", "systemd" use restricted volume type "hostPath"), runAsNonRoot != true (pod or container "cluster-tools" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "cluster-tools" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") I, [2025-03-06 11:52:32 UTC #210] INFO -- cnf-testsuite: ClusterTools wait_for_cluster_tools I, [2025-03-06 11:52:32 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.namespaces command: kubectl get namespaces -o json D, [2025-03-06 11:52:32 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.namespaces output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Namespace", "metadata": { "creationTimestamp": "2025-03-06T11:52:21Z", "labels": { "kubernetes.io/metadata.name": "cnf-testsuite", "pod-security.kubernetes.io/enforce": "privileged" }, "name": "cnf-testsuite", "resourceVersion": "4961120", "uid": "339d74b5-bae7-4452-9537-637944b57f79" }, "spec": { "finalizers": [ "kubernetes" ] }, "status": { "phase": "Active" } }, { "apiVersion": "v1", "kind": "Namespace", "metadata": { "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "kubernetes.io/metadata.name": "default" }, "name": "default", "resourceVersion": "41", "uid": "582d4c13-470d-46d8-a141-1fe0bacc8254" }, "spec": { "finalizers": [ "kubernetes" ] }, "status": { "phase": "Active" } }, { "apiVersion": "v1", "kind": "Namespace", "metadata": { "creationTimestamp": "2025-03-06T11:44:51Z", "deletionTimestamp": "2025-03-06T11:52:17Z", "generateName": "ims-", "labels": { "kubernetes.io/metadata.name": "ims-27jwv", "pod-security.kubernetes.io/enforce": "baseline" }, "name": "ims-27jwv", "resourceVersion": "4961268", "uid": "36020830-5f11-4669-bc06-3b87e8833da0" }, "spec": { "finalizers": [ "kubernetes" ] }, "status": { "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:22Z", "message": "All resources successfully discovered", "reason": "ResourcesDiscovered", "status": "False", "type": "NamespaceDeletionDiscoveryFailure" }, { "lastTransitionTime": "2025-03-06T11:52:22Z", "message": "All legacy kube types successfully parsed", "reason": "ParsedGroupVersions", "status": "False", "type": "NamespaceDeletionGroupVersionParsingFailure" }, { "lastTransitionTime": "2025-03-06T11:52:22Z", "message": "All content successfully deleted, may be waiting on finalization", "reason": "ContentDeleted", "status": "False", "type": "NamespaceDeletionContentFailure" }, { "lastTransitionTime": "2025-03-06T11:52:22Z", "message": "Some resources are remaining: pods. has 6 resource instances", "reason": "SomeResourcesRemain", "status": "True", "type": "NamespaceContentRemaining" }, { "lastTransitionTime": "2025-03-06T11:52:22Z", "message": "All content-preserving finalizers finished", "reason": "ContentHasNoFinalizers", "status": "False", "type": "NamespaceFinalizersRemaining" } ], "phase": "Terminating" } }, { "apiVersion": "v1", "kind": "Namespace", "metadata": { "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "kubernetes.io/metadata.name": "kube-node-lease" }, "name": "kube-node-lease", "resourceVersion": "65", "uid": "eb770c0e-e101-4c8f-9a8d-46783f79a977" }, "spec": { "finalizers": [ "kubernetes" ] }, "status": { "phase": "Active" } }, { "apiVersion": "v1", "kind": "Namespace", "metadata": { "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "kubernetes.io/metadata.name": "kube-public" }, "name": "kube-public", "resourceVersion": "35", "uid": "5c0fe4a6-8a5e-483c-91c2-5c71550db77b" }, "spec": { "finalizers": [ "kubernetes" ] }, "status": { "phase": "Active" } }, { "apiVersion": "v1", "kind": "Namespace", "metadata": { "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "kubernetes.io/metadata.name": "kube-system" }, "name": "kube-system", "resourceVersion": "12", "uid": "731b18ca-8630-4343-96b2-dcabfb462b9e" }, "spec": { "finalizers": [ "kubernetes" ] }, "status": { "phase": "Active" } }, { "apiVersion": "v1", "kind": "Namespace", "metadata": { "annotations": { "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"local-path-storage\"}}\n" }, "creationTimestamp": "2025-01-31T08:09:11Z", "labels": { "kubernetes.io/metadata.name": "local-path-storage" }, "name": "local-path-storage", "resourceVersion": "288", "uid": "7b1bef67-ca69-4da8-bec4-7a44649be129" }, "spec": { "finalizers": [ "kubernetes" ] }, "status": { "phase": "Active" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:52:32 UTC #210] DEBUG -- cnf-testsuite: ClusterTools ensure_namespace_exists namespace_array: [{"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:21Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-testsuite", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-testsuite", "resourceVersion" => "4961120", "uid" => "339d74b5-bae7-4452-9537-637944b57f79"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:05Z", "labels" => {"kubernetes.io/metadata.name" => "default"}, "name" => "default", "resourceVersion" => "41", "uid" => "582d4c13-470d-46d8-a141-1fe0bacc8254"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-03-06T11:44:51Z", "deletionTimestamp" => "2025-03-06T11:52:17Z", "generateName" => "ims-", "labels" => {"kubernetes.io/metadata.name" => "ims-27jwv", "pod-security.kubernetes.io/enforce" => "baseline"}, "name" => "ims-27jwv", "resourceVersion" => "4961268", "uid" => "36020830-5f11-4669-bc06-3b87e8833da0"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"conditions" => [{"lastTransitionTime" => "2025-03-06T11:52:22Z", "message" => "All resources successfully discovered", "reason" => "ResourcesDiscovered", "status" => "False", "type" => "NamespaceDeletionDiscoveryFailure"}, {"lastTransitionTime" => "2025-03-06T11:52:22Z", "message" => "All legacy kube types successfully parsed", "reason" => "ParsedGroupVersions", "status" => "False", "type" => "NamespaceDeletionGroupVersionParsingFailure"}, {"lastTransitionTime" => "2025-03-06T11:52:22Z", "message" => "All content successfully deleted, may be waiting on finalization", "reason" => "ContentDeleted", "status" => "False", "type" => "NamespaceDeletionContentFailure"}, {"lastTransitionTime" => "2025-03-06T11:52:22Z", "message" => "Some resources are remaining: pods. has 6 resource instances", "reason" => "SomeResourcesRemain", "status" => "True", "type" => "NamespaceContentRemaining"}, {"lastTransitionTime" => "2025-03-06T11:52:22Z", "message" => "All content-preserving finalizers finished", "reason" => "ContentHasNoFinalizers", "status" => "False", "type" => "NamespaceFinalizersRemaining"}], "phase" => "Terminating"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:05Z", "labels" => {"kubernetes.io/metadata.name" => "kube-node-lease"}, "name" => "kube-node-lease", "resourceVersion" => "65", "uid" => "eb770c0e-e101-4c8f-9a8d-46783f79a977"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:05Z", "labels" => {"kubernetes.io/metadata.name" => "kube-public"}, "name" => "kube-public", "resourceVersion" => "35", "uid" => "5c0fe4a6-8a5e-483c-91c2-5c71550db77b"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:05Z", "labels" => {"kubernetes.io/metadata.name" => "kube-system"}, "name" => "kube-system", "resourceVersion" => "12", "uid" => "731b18ca-8630-4343-96b2-dcabfb462b9e"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"local-path-storage\"}}\n"}, "creationTimestamp" => "2025-01-31T08:09:11Z", "labels" => {"kubernetes.io/metadata.name" => "local-path-storage"}, "name" => "local-path-storage", "resourceVersion" => "288", "uid" => "7b1bef67-ca69-4da8-bec4-7a44649be129"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}] I, [2025-03-06 11:52:32 UTC #210] INFO -- cnf-testsuite: resource_wait_for_install kind: Daemonset resource_name: cluster-tools namespace: cnf-testsuite kubeconfig: I, [2025-03-06 11:52:32 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Daemonset --namespace=cnf-testsuite cluster-tools -o=jsonpath='{.status.desiredNumberScheduled}' D, [2025-03-06 11:52:32 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 2 I, [2025-03-06 11:52:32 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Daemonset --namespace=cnf-testsuite cluster-tools -o=jsonpath='{.status.numberAvailable}' D, [2025-03-06 11:52:33 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: I, [2025-03-06 11:52:33 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Daemonset --namespace=cnf-testsuite cluster-tools -o=jsonpath='{.status.unavailableReplicas}' D, [2025-03-06 11:52:33 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: I, [2025-03-06 11:52:33 UTC #210] INFO -- cnf-testsuite: current_replicas: -1, desired_replicas: 2 I, [2025-03-06 11:52:33 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.resource_wait_for_install attempt: 0; is_ready: false I, [2025-03-06 11:52:34 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Daemonset --namespace=cnf-testsuite cluster-tools -o=jsonpath='{.status.desiredNumberScheduled}' D, [2025-03-06 11:52:34 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 2 I, [2025-03-06 11:52:34 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Daemonset --namespace=cnf-testsuite cluster-tools -o=jsonpath='{.status.numberAvailable}' D, [2025-03-06 11:52:34 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: I, [2025-03-06 11:52:34 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Daemonset --namespace=cnf-testsuite cluster-tools -o=jsonpath='{.status.unavailableReplicas}' D, [2025-03-06 11:52:34 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: I, [2025-03-06 11:52:34 UTC #210] INFO -- cnf-testsuite: current_replicas: -1, desired_replicas: 2 I, [2025-03-06 11:52:34 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.resource_wait_for_install attempt: 1; is_ready: false I, [2025-03-06 11:52:35 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Daemonset --namespace=cnf-testsuite cluster-tools -o=jsonpath='{.status.desiredNumberScheduled}' D, [2025-03-06 11:52:35 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 2 I, [2025-03-06 11:52:35 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Daemonset --namespace=cnf-testsuite cluster-tools -o=jsonpath='{.status.numberAvailable}' D, [2025-03-06 11:52:35 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 2 I, [2025-03-06 11:52:35 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Daemonset --namespace=cnf-testsuite cluster-tools -o=jsonpath='{.status.unavailableReplicas}' ClusterTools installed CNF installation start. Installing deployment "coredns". D, [2025-03-06 11:52:35 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: I, [2025-03-06 11:52:35 UTC #210] INFO -- cnf-testsuite: current_replicas: 2, desired_replicas: 2 I, [2025-03-06 11:52:35 UTC #210] INFO -- cnf-testsuite: is_ready kind/resource Daemonset, cluster-tools: true D, [2025-03-06 11:52:35 UTC #210] DEBUG -- cnf-testsuite-cnf_install: cli_args = # "example-cnfs/coredns/cnf-testsuite.yml"}> D, [2025-03-06 11:52:35 UTC #210] DEBUG -- cnf-testsuite-cnf_install: parsed_cli_args = {config_path: "example-cnfs/coredns/cnf-testsuite.yml", timeout: 1800, skip_wait_for_install: false} D, [2025-03-06 11:52:35 UTC #210] DEBUG -- cnf-testsuite: helm_v3?: BuildInfo{Version:"v3.6.0", GitCommit:"7f2df6467771a75f5646b7f12afb408590ed1755", GitTreeState:"clean", GoVersion:"go1.16.3" I, [2025-03-06 11:52:35 UTC #210] INFO -- cnf-testsuite: helm_repo_add: helm repo add command: helm repo add stable https://cncf.gitlab.io/stable I, [2025-03-06 11:52:36 UTC #210] INFO -- cnf-testsuite: error: I, [2025-03-06 11:52:36 UTC #210] INFO -- cnf-testsuite: helm_resp (add): "stable" has been added to your repositories I, [2025-03-06 11:52:36 UTC #210] INFO -- cnf-testsuite: helm command: helm pull stable/coredns --untar --destination installed_cnf_files/deployments/coredns I, [2025-03-06 11:52:36 UTC #210] INFO -- cnf-testsuite: Helm.pull output: I, [2025-03-06 11:52:36 UTC #210] INFO -- cnf-testsuite: Helm.pull stderr: I, [2025-03-06 11:52:36 UTC #210] INFO -- cnf-testsuite: KubectlClient::Create.namespace command: kubectl create namespace cnf-default D, [2025-03-06 11:52:37 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Create.namespace output: namespace/cnf-default created I, [2025-03-06 11:52:37 UTC #210] INFO -- cnf-testsuite-ensure_namespace_exists: Created kubernetes namespace cnf-default for the CNF install I, [2025-03-06 11:52:37 UTC #210] INFO -- cnf-testsuite-Label.namespace: command: kubectl label namespace cnf-default pod-security.kubernetes.io/enforce=privileged D, [2025-03-06 11:52:37 UTC #210] DEBUG -- cnf-testsuite-Label.namespace: output: namespace/cnf-default labeled I, [2025-03-06 11:52:37 UTC #210] INFO -- cnf-testsuite: helm command: helm install coredns installed_cnf_files/deployments/coredns/coredns -n cnf-default I, [2025-03-06 11:52:37 UTC #210] INFO -- cnf-testsuite: Helm.install output: NAME: coredns LAST DEPLOYED: Thu Mar 6 11:52:37 2025 NAMESPACE: cnf-default STATUS: deployed REVISION: 1 TEST SUITE: None NOTES: CoreDNS is now running in the cluster as a cluster-service. It can be tested with the following: 1. Launch a Pod with DNS tools: kubectl run -it --rm --restart=Never --image=infoblox/dnstools:latest dnstools 2. Query the DNS server: / # host kubernetes I, [2025-03-06 11:52:37 UTC #210] INFO -- cnf-testsuite: Helm.install stderr: W0306 11:52:37.659544 632 warnings.go:70] spec.template.metadata.annotations[scheduler.alpha.kubernetes.io/critical-pod]: non-functional in v1.16+; use the "priorityClassName" field instead W0306 11:52:37.659576 632 warnings.go:70] would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "coredns" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "coredns" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "coredns" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "coredns" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") I, [2025-03-06 11:52:37 UTC #210] INFO -- cnf-testsuite: Generating manifest from installed CNF: coredns I, [2025-03-06 11:52:37 UTC #210] INFO -- cnf-testsuite: helm command: helm get manifest coredns --namespace cnf-default D, [2025-03-06 11:52:37 UTC #210] DEBUG -- cnf-testsuite: Helm.manifest output: --- # Source: coredns/templates/configmap.yaml apiVersion: v1 kind: ConfigMap metadata: name: coredns-coredns labels: app.kubernetes.io/managed-by: "Helm" app.kubernetes.io/instance: "coredns" helm.sh/chart: "coredns-1.13.8" k8s-app: "coredns" kubernetes.io/cluster-service: "true" kubernetes.io/name: "CoreDNS" app.kubernetes.io/name: coredns data: Corefile: |- .:53 { errors health { lameduck 5s } ready kubernetes cluster.local in-addr.arpa ip6.arpa { pods insecure fallthrough in-addr.arpa ip6.arpa ttl 30 } prometheus 0.0.0.0:9153 forward . /etc/resolv.conf cache 30 loop reload loadbalance } --- # Source: coredns/templates/clusterrole.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: coredns-coredns labels: app.kubernetes.io/managed-by: "Helm" app.kubernetes.io/instance: "coredns" helm.sh/chart: "coredns-1.13.8" k8s-app: "coredns" kubernetes.io/cluster-service: "true" kubernetes.io/name: "CoreDNS" app.kubernetes.io/name: coredns rules: - apiGroups: - "" resources: - endpoints - services - pods - namespaces verbs: - list - watch --- # Source: coredns/templates/clusterrolebinding.yaml apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: coredns-coredns labels: app.kubernetes.io/managed-by: "Helm" app.kubernetes.io/instance: "coredns" helm.sh/chart: "coredns-1.13.8" k8s-app: "coredns" kubernetes.io/cluster-service: "true" kubernetes.io/name: "CoreDNS" app.kubernetes.io/name: coredns roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: coredns-coredns subjects: - kind: ServiceAccount name: default namespace: cnf-default --- # Source: coredns/templates/service.yaml apiVersion: v1 kind: Service metadata: name: coredns-coredns labels: app.kubernetes.io/managed-by: "Helm" app.kubernetes.io/instance: "coredns" helm.sh/chart: "coredns-1.13.8" k8s-app: "coredns" kubernetes.io/cluster-service: "true" kubernetes.io/name: "CoreDNS" app.kubernetes.io/name: coredns annotations: {} spec: selector: app.kubernetes.io/instance: "coredns" k8s-app: "coredns" app.kubernetes.io/name: coredns ports: - {port: 53, protocol: UDP, name: udp-53} - {port: 53, protocol: TCP, name: tcp-53} type: ClusterIP --- # Source: coredns/templates/deployment.yaml apiVersion: apps/v1 kind: Deployment metadata: name: coredns-coredns labels: app.kubernetes.io/managed-by: "Helm" app.kubernetes.io/instance: "coredns" helm.sh/chart: "coredns-1.13.8" k8s-app: "coredns" kubernetes.io/cluster-service: "true" kubernetes.io/name: "CoreDNS" app.kubernetes.io/name: coredns spec: replicas: 1 strategy: type: RollingUpdate rollingUpdate: maxUnavailable: 1 maxSurge: 25% selector: matchLabels: app.kubernetes.io/instance: "coredns" k8s-app: "coredns" app.kubernetes.io/name: coredns template: metadata: labels: k8s-app: "coredns" app.kubernetes.io/name: coredns app.kubernetes.io/instance: "coredns" annotations: checksum/config: 473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9 scheduler.alpha.kubernetes.io/critical-pod: '' scheduler.alpha.kubernetes.io/tolerations: '[{"key":"CriticalAddonsOnly", "operator":"Exists"}]' spec: terminationGracePeriodSeconds: 30 serviceAccountName: default dnsPolicy: Default containers: - name: "coredns" image: "coredns/coredns:1.7.1" imagePullPolicy: IfNotPresent args: [ "-conf", "/etc/coredns/Corefile" ] volumeMounts: - name: config-volume mountPath: /etc/coredns resources: limits: cpu: 100m memory: 128Mi requests: cpu: 100m memory: 128Mi ports: - {containerPort: 53, protocol: UDP, name: udp-53} - {containerPort: 53, protocol: TCP, name: tcp-53} livenessProbe: httpGet: path: /health port: 8080 scheme: HTTP initialDelaySeconds: 60 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 readinessProbe: httpGet: path: /ready port: 8181 scheme: HTTP initialDelaySeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 volumes: - name: config-volume configMap: name: coredns-coredns items: - key: Corefile path: Corefile I, [2025-03-06 11:52:37 UTC #210] INFO -- cnf-testsuite: Manifest was generated successfully I, [2025-03-06 11:52:37 UTC #210] INFO -- cnf-testsuite-add_namespace_to_resources: Updating metadata.namespace field for resources in generated manifest I, [2025-03-06 11:52:37 UTC #210] INFO -- cnf-testsuite: command: kubectl api-resources --namespaced=true --no-headers Waiting for resource for "coredns" deployment (1/1): [Deployment] coredns-coredns D, [2025-03-06 11:52:37 UTC #210] DEBUG -- cnf-testsuite: output: bindings v1 true Binding configmaps cm v1 true ConfigMap endpoints ep v1 true Endpoints events ev v1 true Event limitranges limits v1 true LimitRange persistentvolumeclaims pvc v1 true PersistentVolumeClaim pods po v1 true Pod podtemplates v1 true PodTemplate replicationcontrollers rc v1 true ReplicationController resourcequotas quota v1 true ResourceQuota secrets v1 true Secret serviceaccounts sa v1 true ServiceAccount services svc v1 true Service controllerrevisions apps/v1 true ControllerRevision daemonsets ds apps/v1 true DaemonSet deployments deploy apps/v1 true Deployment replicasets rs apps/v1 true ReplicaSet statefulsets sts apps/v1 true StatefulSet localsubjectaccessreviews authorization.k8s.io/v1 true LocalSubjectAccessReview horizontalpodautoscalers hpa autoscaling/v2 true HorizontalPodAutoscaler cronjobs cj batch/v1 true CronJob jobs batch/v1 true Job configs config.gatekeeper.sh/v1alpha1 true Config leases coordination.k8s.io/v1 true Lease endpointslices discovery.k8s.io/v1 true EndpointSlice events ev events.k8s.io/v1 true Event ingresses ing networking.k8s.io/v1 true Ingress networkpolicies netpol networking.k8s.io/v1 true NetworkPolicy poddisruptionbudgets pdb policy/v1 true PodDisruptionBudget rolebindings rbac.authorization.k8s.io/v1 true RoleBinding roles rbac.authorization.k8s.io/v1 true Role configpodstatuses status.gatekeeper.sh/v1beta1 true ConfigPodStatus constraintpodstatuses status.gatekeeper.sh/v1beta1 true ConstraintPodStatus constrainttemplatepodstatuses status.gatekeeper.sh/v1beta1 true ConstraintTemplatePodStatus expansiontemplatepodstatuses status.gatekeeper.sh/v1beta1 true ExpansionTemplatePodStatus mutatorpodstatuses status.gatekeeper.sh/v1beta1 true MutatorPodStatus csistoragecapacities storage.k8s.io/v1 true CSIStorageCapacity I, [2025-03-06 11:52:37 UTC #210] INFO -- cnf-testsuite: manifest_string_to_ymls D, [2025-03-06 11:52:37 UTC #210] DEBUG -- cnf-testsuite: manifest_string_to_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:52:37 UTC #210] INFO -- cnf-testsuite-add_namespace_to_resources: Added cnf-default namespace for resource: {kind: ConfigMap, name: coredns-coredns} I, [2025-03-06 11:52:37 UTC #210] INFO -- cnf-testsuite-add_namespace_to_resources: Added cnf-default namespace for resource: {kind: Service, name: coredns-coredns} I, [2025-03-06 11:52:37 UTC #210] INFO -- cnf-testsuite-add_namespace_to_resources: Added cnf-default namespace for resource: {kind: Deployment, name: coredns-coredns} I, [2025-03-06 11:52:37 UTC #210] INFO -- cnf-testsuite: combine_ymls_as_manifest_string D, [2025-03-06 11:52:37 UTC #210] DEBUG -- cnf-testsuite: combine_ymls_as_manifest: --- apiVersion: v1 kind: ConfigMap metadata: name: coredns-coredns labels: app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: coredns helm.sh/chart: coredns-1.13.8 k8s-app: coredns kubernetes.io/cluster-service: "true" kubernetes.io/name: CoreDNS app.kubernetes.io/name: coredns namespace: cnf-default data: Corefile: ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n \ kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n \ fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n \ loadbalance\n}" --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: coredns-coredns labels: app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: coredns helm.sh/chart: coredns-1.13.8 k8s-app: coredns kubernetes.io/cluster-service: "true" kubernetes.io/name: CoreDNS app.kubernetes.io/name: coredns rules: - apiGroups: - "" resources: - endpoints - services - pods - namespaces verbs: - list - watch --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: coredns-coredns labels: app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: coredns helm.sh/chart: coredns-1.13.8 k8s-app: coredns kubernetes.io/cluster-service: "true" kubernetes.io/name: CoreDNS app.kubernetes.io/name: coredns roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: coredns-coredns subjects: - kind: ServiceAccount name: default namespace: cnf-default --- apiVersion: v1 kind: Service metadata: name: coredns-coredns labels: app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: coredns helm.sh/chart: coredns-1.13.8 k8s-app: coredns kubernetes.io/cluster-service: "true" kubernetes.io/name: CoreDNS app.kubernetes.io/name: coredns annotations: {} namespace: cnf-default spec: selector: app.kubernetes.io/instance: coredns k8s-app: coredns app.kubernetes.io/name: coredns ports: - port: 53 protocol: UDP name: udp-53 - port: 53 protocol: TCP name: tcp-53 type: ClusterIP --- apiVersion: apps/v1 kind: Deployment metadata: name: coredns-coredns labels: app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: coredns helm.sh/chart: coredns-1.13.8 k8s-app: coredns kubernetes.io/cluster-service: "true" kubernetes.io/name: CoreDNS app.kubernetes.io/name: coredns namespace: cnf-default spec: replicas: 1 strategy: type: RollingUpdate rollingUpdate: maxUnavailable: 1 maxSurge: 25% selector: matchLabels: app.kubernetes.io/instance: coredns k8s-app: coredns app.kubernetes.io/name: coredns template: metadata: labels: k8s-app: coredns app.kubernetes.io/name: coredns app.kubernetes.io/instance: coredns annotations: checksum/config: 473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9 scheduler.alpha.kubernetes.io/critical-pod: "" scheduler.alpha.kubernetes.io/tolerations: '[{"key":"CriticalAddonsOnly", "operator":"Exists"}]' spec: terminationGracePeriodSeconds: 30 serviceAccountName: default dnsPolicy: Default containers: - name: coredns image: coredns/coredns:1.7.1 imagePullPolicy: IfNotPresent args: - -conf - /etc/coredns/Corefile volumeMounts: - name: config-volume mountPath: /etc/coredns resources: limits: cpu: 100m memory: 128Mi requests: cpu: 100m memory: 128Mi ports: - containerPort: 53 protocol: UDP name: udp-53 - containerPort: 53 protocol: TCP name: tcp-53 livenessProbe: httpGet: path: /health port: 8080 scheme: HTTP initialDelaySeconds: 60 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 readinessProbe: httpGet: path: /ready port: 8181 scheme: HTTP initialDelaySeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 volumes: - name: config-volume configMap: name: coredns-coredns items: - key: Corefile path: Corefile D, [2025-03-06 11:52:37 UTC #210] DEBUG -- cnf-testsuite-add_namespace_to_resources: --- apiVersion: v1 kind: ConfigMap metadata: name: coredns-coredns labels: app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: coredns helm.sh/chart: coredns-1.13.8 k8s-app: coredns kubernetes.io/cluster-service: "true" kubernetes.io/name: CoreDNS app.kubernetes.io/name: coredns namespace: cnf-default data: Corefile: ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n \ kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n \ fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n \ loadbalance\n}" --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: name: coredns-coredns labels: app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: coredns helm.sh/chart: coredns-1.13.8 k8s-app: coredns kubernetes.io/cluster-service: "true" kubernetes.io/name: CoreDNS app.kubernetes.io/name: coredns rules: - apiGroups: - "" resources: - endpoints - services - pods - namespaces verbs: - list - watch --- apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: name: coredns-coredns labels: app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: coredns helm.sh/chart: coredns-1.13.8 k8s-app: coredns kubernetes.io/cluster-service: "true" kubernetes.io/name: CoreDNS app.kubernetes.io/name: coredns roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: coredns-coredns subjects: - kind: ServiceAccount name: default namespace: cnf-default --- apiVersion: v1 kind: Service metadata: name: coredns-coredns labels: app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: coredns helm.sh/chart: coredns-1.13.8 k8s-app: coredns kubernetes.io/cluster-service: "true" kubernetes.io/name: CoreDNS app.kubernetes.io/name: coredns annotations: {} namespace: cnf-default spec: selector: app.kubernetes.io/instance: coredns k8s-app: coredns app.kubernetes.io/name: coredns ports: - port: 53 protocol: UDP name: udp-53 - port: 53 protocol: TCP name: tcp-53 type: ClusterIP --- apiVersion: apps/v1 kind: Deployment metadata: name: coredns-coredns labels: app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: coredns helm.sh/chart: coredns-1.13.8 k8s-app: coredns kubernetes.io/cluster-service: "true" kubernetes.io/name: CoreDNS app.kubernetes.io/name: coredns namespace: cnf-default spec: replicas: 1 strategy: type: RollingUpdate rollingUpdate: maxUnavailable: 1 maxSurge: 25% selector: matchLabels: app.kubernetes.io/instance: coredns k8s-app: coredns app.kubernetes.io/name: coredns template: metadata: labels: k8s-app: coredns app.kubernetes.io/name: coredns app.kubernetes.io/instance: coredns annotations: checksum/config: 473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9 scheduler.alpha.kubernetes.io/critical-pod: "" scheduler.alpha.kubernetes.io/tolerations: '[{"key":"CriticalAddonsOnly", "operator":"Exists"}]' spec: terminationGracePeriodSeconds: 30 serviceAccountName: default dnsPolicy: Default containers: - name: coredns image: coredns/coredns:1.7.1 imagePullPolicy: IfNotPresent args: - -conf - /etc/coredns/Corefile volumeMounts: - name: config-volume mountPath: /etc/coredns resources: limits: cpu: 100m memory: 128Mi requests: cpu: 100m memory: 128Mi ports: - containerPort: 53 protocol: UDP name: udp-53 - containerPort: 53 protocol: TCP name: tcp-53 livenessProbe: httpGet: path: /health port: 8080 scheme: HTTP initialDelaySeconds: 60 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 readinessProbe: httpGet: path: /ready port: 8181 scheme: HTTP initialDelaySeconds: 10 timeoutSeconds: 5 successThreshold: 1 failureThreshold: 5 volumes: - name: config-volume configMap: name: coredns-coredns items: - key: Corefile path: Corefile I, [2025-03-06 11:52:37 UTC #210] INFO -- cnf-testsuite: coredns manifest was appended into installed_cnf_files/deployments/coredns/deployment_manifest.yml file I, [2025-03-06 11:52:37 UTC #210] INFO -- cnf-testsuite: coredns manifest was appended into installed_cnf_files/common_manifest.yml file I, [2025-03-06 11:52:37 UTC #210] INFO -- cnf-testsuite: manifest_string_to_ymls D, [2025-03-06 11:52:37 UTC #210] DEBUG -- cnf-testsuite: manifest_string_to_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:52:37 UTC #210] DEBUG -- cnf-testsuite: resource names: [{kind: "ConfigMap", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "ClusterRole", name: "coredns-coredns", namespace: "default"}, {kind: "ClusterRoleBinding", name: "coredns-coredns", namespace: "default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}] I, [2025-03-06 11:52:37 UTC #210] INFO -- cnf-testsuite: resource_wait_for_install kind: Deployment resource_name: coredns-coredns namespace: cnf-default kubeconfig: I, [2025-03-06 11:52:37 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.replicas}' D, [2025-03-06 11:52:38 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 1 I, [2025-03-06 11:52:38 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.unavailableReplicas}' D, [2025-03-06 11:52:38 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 1 I, [2025-03-06 11:52:38 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.readyReplicas}' D, [2025-03-06 11:52:38 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: I, [2025-03-06 11:52:38 UTC #210] INFO -- cnf-testsuite: current_replicas: -1, desired_replicas: 1, unavailable_replicas: 1 I, [2025-03-06 11:52:38 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.resource_wait_for_install attempt: 0; is_ready: false I, [2025-03-06 11:52:39 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.replicas}' D, [2025-03-06 11:52:39 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 1 I, [2025-03-06 11:52:39 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.unavailableReplicas}' D, [2025-03-06 11:52:39 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 1 I, [2025-03-06 11:52:39 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.readyReplicas}' D, [2025-03-06 11:52:39 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: I, [2025-03-06 11:52:39 UTC #210] INFO -- cnf-testsuite: current_replicas: -1, desired_replicas: 1, unavailable_replicas: 1 I, [2025-03-06 11:52:39 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.resource_wait_for_install attempt: 1; is_ready: false I, [2025-03-06 11:52:40 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.replicas}' D, [2025-03-06 11:52:40 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 1 I, [2025-03-06 11:52:40 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.unavailableReplicas}' D, [2025-03-06 11:52:40 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 1 I, [2025-03-06 11:52:40 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.readyReplicas}' D, [2025-03-06 11:52:40 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: I, [2025-03-06 11:52:40 UTC #210] INFO -- cnf-testsuite: current_replicas: -1, desired_replicas: 1, unavailable_replicas: 1 I, [2025-03-06 11:52:40 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.resource_wait_for_install attempt: 2; is_ready: false I, [2025-03-06 11:52:41 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.replicas}' D, [2025-03-06 11:52:42 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 1 I, [2025-03-06 11:52:42 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.unavailableReplicas}' D, [2025-03-06 11:52:42 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 1 I, [2025-03-06 11:52:42 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.readyReplicas}' D, [2025-03-06 11:52:42 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: I, [2025-03-06 11:52:42 UTC #210] INFO -- cnf-testsuite: current_replicas: -1, desired_replicas: 1, unavailable_replicas: 1 I, [2025-03-06 11:52:42 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.resource_wait_for_install attempt: 3; is_ready: false I, [2025-03-06 11:52:43 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.replicas}' D, [2025-03-06 11:52:43 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 1 I, [2025-03-06 11:52:43 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.unavailableReplicas}' D, [2025-03-06 11:52:43 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 1 I, [2025-03-06 11:52:43 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.readyReplicas}' D, [2025-03-06 11:52:43 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: I, [2025-03-06 11:52:43 UTC #210] INFO -- cnf-testsuite: current_replicas: -1, desired_replicas: 1, unavailable_replicas: 1 I, [2025-03-06 11:52:43 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.resource_wait_for_install attempt: 4; is_ready: false I, [2025-03-06 11:52:44 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.replicas}' D, [2025-03-06 11:52:44 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 1 I, [2025-03-06 11:52:44 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.unavailableReplicas}' D, [2025-03-06 11:52:44 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 1 I, [2025-03-06 11:52:44 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.readyReplicas}' D, [2025-03-06 11:52:44 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: I, [2025-03-06 11:52:44 UTC #210] INFO -- cnf-testsuite: current_replicas: -1, desired_replicas: 1, unavailable_replicas: 1 I, [2025-03-06 11:52:44 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.resource_wait_for_install attempt: 5; is_ready: false I, [2025-03-06 11:52:45 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.replicas}' D, [2025-03-06 11:52:45 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 1 I, [2025-03-06 11:52:45 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.unavailableReplicas}' D, [2025-03-06 11:52:46 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 1 I, [2025-03-06 11:52:46 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.readyReplicas}' D, [2025-03-06 11:52:46 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: I, [2025-03-06 11:52:46 UTC #210] INFO -- cnf-testsuite: current_replicas: -1, desired_replicas: 1, unavailable_replicas: 1 I, [2025-03-06 11:52:46 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.resource_wait_for_install attempt: 6; is_ready: false I, [2025-03-06 11:52:47 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.replicas}' D, [2025-03-06 11:52:47 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 1 I, [2025-03-06 11:52:47 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.unavailableReplicas}' D, [2025-03-06 11:52:47 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 1 I, [2025-03-06 11:52:47 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.readyReplicas}' D, [2025-03-06 11:52:47 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: I, [2025-03-06 11:52:47 UTC #210] INFO -- cnf-testsuite: current_replicas: -1, desired_replicas: 1, unavailable_replicas: 1 I, [2025-03-06 11:52:47 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.resource_wait_for_install attempt: 7; is_ready: false I, [2025-03-06 11:52:48 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.replicas}' D, [2025-03-06 11:52:48 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 1 I, [2025-03-06 11:52:48 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.unavailableReplicas}' D, [2025-03-06 11:52:48 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 1 I, [2025-03-06 11:52:48 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.readyReplicas}' D, [2025-03-06 11:52:48 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: I, [2025-03-06 11:52:48 UTC #210] INFO -- cnf-testsuite: current_replicas: -1, desired_replicas: 1, unavailable_replicas: 1 I, [2025-03-06 11:52:48 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.resource_wait_for_install attempt: 8; is_ready: false I, [2025-03-06 11:52:49 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.replicas}' D, [2025-03-06 11:52:49 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 1 I, [2025-03-06 11:52:49 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.unavailableReplicas}' D, [2025-03-06 11:52:50 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 1 I, [2025-03-06 11:52:50 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.readyReplicas}' D, [2025-03-06 11:52:50 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: I, [2025-03-06 11:52:50 UTC #210] INFO -- cnf-testsuite: current_replicas: -1, desired_replicas: 1, unavailable_replicas: 1 I, [2025-03-06 11:52:50 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.resource_wait_for_install attempt: 9; is_ready: false I, [2025-03-06 11:52:51 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.replicas}' D, [2025-03-06 11:52:51 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 1 I, [2025-03-06 11:52:51 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.unavailableReplicas}' D, [2025-03-06 11:52:51 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 1 I, [2025-03-06 11:52:51 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.readyReplicas}' D, [2025-03-06 11:52:51 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: I, [2025-03-06 11:52:51 UTC #210] INFO -- cnf-testsuite: current_replicas: -1, desired_replicas: 1, unavailable_replicas: 1 I, [2025-03-06 11:52:51 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.resource_wait_for_install attempt: 10; is_ready: false I, [2025-03-06 11:52:52 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.replicas}' D, [2025-03-06 11:52:52 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 1 I, [2025-03-06 11:52:52 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.unavailableReplicas}' D, [2025-03-06 11:52:52 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: I, [2025-03-06 11:52:52 UTC #210] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=cnf-default coredns-coredns -o=jsonpath='{.status.readyReplicas}' All "coredns" deployment resources are up. CNF installation complete. D, [2025-03-06 11:52:52 UTC #210] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 1 I, [2025-03-06 11:52:52 UTC #210] INFO -- cnf-testsuite: current_replicas: 1, desired_replicas: 1, unavailable_replicas: -1 I, [2025-03-06 11:52:52 UTC #210] INFO -- cnf-testsuite: is_ready kind/resource Deployment, coredns-coredns: true 2025-03-06 11:58:31,976 - functest_kubernetes.cnf_conformance.conformance - INFO - cnf-testsuite cert -l debug CNF TestSuite version: v1.4.1 Compatibility, Installability & Upgradability Tests I, [2025-03-06 11:52:52 UTC #1422] INFO -- cnf-testsuite: VERSION: v1.4.1 D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:default_scoring, points.tags: D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name cni_compatible D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name increase_decrease_capacity D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name rolling_update D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name rolling_downgrade D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name rolling_version_change D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name rollback D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name helm_deploy D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name helm_chart_valid D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name helm_chart_published D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:52:52 UTC #1422] INFO -- cnf-testsuite: task_runner args: # D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: Results.file created: results/cnf-testsuite-results-20250306-115252-815.yml I, [2025-03-06 11:52:52 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:52:52 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" I, [2025-03-06 11:52:52 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:52:52 UTC #1422] INFO -- cnf-testsuite: ensure_cnf_installed? true I, [2025-03-06 11:52:52 UTC #1422] INFO -- cnf-testsuite: check_cnf_config args: # I, [2025-03-06 11:52:52 UTC #1422] INFO -- cnf-testsuite: check_cnf_config cnf: I, [2025-03-06 11:52:52 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:52:52 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [increase_decrease_capacity] I, [2025-03-06 11:52:52 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:52:52 UTC #1422] INFO -- cnf-testsuite: CNF configs found: 1 D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: single_task_runner args: # "installed_cnf_files/cnf-testsuite.yml"}> I, [2025-03-06 11:52:52 UTC #1422] INFO -- cnf-testsuite-increase_decrease_capacity: Starting test D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite-increase_decrease_capacity: cnf_config: # I, [2025-03-06 11:52:52 UTC #1422] INFO -- cnf-testsuite: cnf_resource_ymls I, [2025-03-06 11:52:52 UTC #1422] INFO -- cnf-testsuite: manifest_path_to_ymls file_path: installed_cnf_files/common_manifest.yml I, [2025-03-06 11:52:52 UTC #1422] INFO -- cnf-testsuite: manifest_string_to_ymls D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: manifest_string_to_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: cnf_resource_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:52:52 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Deployment D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"} D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:52:52 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Service D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"} D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: {} D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] I, [2025-03-06 11:52:52 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Pod D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:52:52 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ReplicaSet D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:52:52 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: StatefulSet D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:52:52 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: DaemonSet D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:52:52 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ServiceAccount D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: resources: [] D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: all resource: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] I, [2025-03-06 11:52:52 UTC #1422] INFO -- cnf-testsuite-change_capacity:resource: Deployment/coredns-coredns; namespace: cnf-default I, [2025-03-06 11:52:52 UTC #1422] INFO -- cnf-testsuite-change_capacity:capacity: Base replicas: 1; Target replicas: 3 I, [2025-03-06 11:52:52 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Scale.command command: kubectl scale Deployment.v1.apps/coredns-coredns --replicas=1 -n cnf-default D, [2025-03-06 11:52:52 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Scale.command output: deployment.apps/coredns-coredns scaled I, [2025-03-06 11:52:53 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Scale.command command: kubectl scale Deployment.v1.apps/coredns-coredns --replicas=3 -n cnf-default D, [2025-03-06 11:52:53 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Scale.command output: deployment.apps/coredns-coredns scaled I, [2025-03-06 11:52:53 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Scale.command stderr: Warning: spec.template.metadata.annotations[scheduler.alpha.kubernetes.io/critical-pod]: non-functional in v1.16+; use the "priorityClassName" field instead I, [2025-03-06 11:52:55 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 58 seconds I, [2025-03-06 11:52:57 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 56 seconds I, [2025-03-06 11:52:59 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 54 seconds I, [2025-03-06 11:53:01 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 52 seconds I, [2025-03-06 11:53:03 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 50 seconds I, [2025-03-06 11:53:06 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 48 seconds I, [2025-03-06 11:53:08 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 46 seconds I, [2025-03-06 11:53:10 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 58 seconds D, [2025-03-06 11:53:10 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: true D, [2025-03-06 11:53:10 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: true I, [2025-03-06 11:53:10 UTC #1422] INFO -- cnf-testsuite: cnf_resource_ymls I, [2025-03-06 11:53:10 UTC #1422] INFO -- cnf-testsuite: manifest_path_to_ymls file_path: installed_cnf_files/common_manifest.yml I, [2025-03-06 11:53:10 UTC #1422] INFO -- cnf-testsuite: manifest_string_to_ymls D, [2025-03-06 11:53:10 UTC #1422] DEBUG -- cnf-testsuite: manifest_string_to_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:53:10 UTC #1422] DEBUG -- cnf-testsuite: cnf_resource_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:53:10 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Deployment D, [2025-03-06 11:53:10 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:53:10 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"} D, [2025-03-06 11:53:10 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: D, [2025-03-06 11:53:10 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:53:10 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Service D, [2025-03-06 11:53:10 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:53:10 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"} D, [2025-03-06 11:53:10 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: {} D, [2025-03-06 11:53:10 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] I, [2025-03-06 11:53:10 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Pod D, [2025-03-06 11:53:10 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:53:10 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:53:10 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ReplicaSet D, [2025-03-06 11:53:10 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:53:10 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:53:10 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: StatefulSet D, [2025-03-06 11:53:10 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:53:10 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:53:10 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: DaemonSet D, [2025-03-06 11:53:10 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:53:10 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:53:10 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ServiceAccount D, [2025-03-06 11:53:10 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:53:10 UTC #1422] DEBUG -- cnf-testsuite: resources: [] D, [2025-03-06 11:53:10 UTC #1422] DEBUG -- cnf-testsuite: all resource: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] I, [2025-03-06 11:53:10 UTC #1422] INFO -- cnf-testsuite-change_capacity:resource: Deployment/coredns-coredns; namespace: cnf-default I, [2025-03-06 11:53:10 UTC #1422] INFO -- cnf-testsuite-change_capacity:capacity: Base replicas: 3; Target replicas: 1 I, [2025-03-06 11:53:10 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Scale.command command: kubectl scale Deployment.v1.apps/coredns-coredns --replicas=3 -n cnf-default D, [2025-03-06 11:53:10 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Scale.command output: deployment.apps/coredns-coredns scaled I, [2025-03-06 11:53:10 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Scale.command command: kubectl scale Deployment.v1.apps/coredns-coredns --replicas=1 -n cnf-default D, [2025-03-06 11:53:10 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Scale.command output: deployment.apps/coredns-coredns scaled I, [2025-03-06 11:53:10 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Scale.command stderr: Warning: spec.template.metadata.annotations[scheduler.alpha.kubernetes.io/critical-pod]: non-functional in v1.16+; use the "priorityClassName" field instead ✔️ 🏆PASSED: [increase_decrease_capacity] Replicas increased to 3 and decreased to 1 📦📈📉 D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: true D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: true D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: task increase_decrease_capacity emoji: 📦📈📉 I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "increase_decrease_capacity", "emoji" => "📦📈📉", "tags" => ["compatibility", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["compatibility", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: resp: ["compatibility", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_type x: compatibility acc: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_points: task: increase_decrease_capacity is worth: 100 points I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: cmd: /usr/local/bin/cnf-testsuite cert I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite-increase_decrease_capacity: task_runtime=00:00:18.204842384; start_time=2025-03-06 11:52:52 UTC; end_time:2025-03-06 11:53:11 UTC I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "increase_decrease_capacity", "emoji" => "📦📈📉", "tags" => ["compatibility", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["compatibility", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: resp: ["compatibility", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_type x: compatibility acc: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: upsert_task: task: increase_decrease_capacity has status: passed and is awarded: 100 points. Runtime: 00:00:18.204842384 D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:default_scoring, points.tags: D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name cni_compatible D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name increase_decrease_capacity D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name rolling_update D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name rolling_downgrade D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name rolling_version_change D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name rollback D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name helm_deploy D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name helm_chart_valid D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name helm_chart_published D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["compatibility", "cert"], found tasks: ["increase_decrease_capacity"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["compatibility", "cert"], increase_decrease_capacity = 100 I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: total_points: ["compatibility", "cert"] = 100 D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_max_points tag: ["compatibility", "cert"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:default_scoring, points.tags: D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name cni_compatible D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name increase_decrease_capacity D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name rolling_update D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name rolling_downgrade D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name rolling_version_change D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name rollback D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name helm_deploy D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name helm_chart_valid D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name helm_chart_published D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks - bonus tasks: 1 I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: skipped tests [] I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: failed tests [] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_scoring, points.tags: D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name service_discovery D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_latency D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_corruption D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_duplication D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_io_stress D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name operator_installed D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name secrets_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_configmap D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name no_local_volume_configuration D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name elastic_volumes D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name linux_hardening D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_file_systems D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name ingress_egress_blocked D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name prometheus_traffic D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name open_metrics D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name routed_logs D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name tracing D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: bonus tasks ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task reduce x: increase_decrease_capacity I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_points: task: increase_decrease_capacity is worth: 100 points I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: total_max_points: ["compatibility", "cert"] = 100 D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_passed: ["compatibility", "cert"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:default_scoring, points.tags: D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name cni_compatible D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name increase_decrease_capacity D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name rolling_update D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name rolling_downgrade D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name rolling_version_change D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name rollback D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name helm_deploy D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name helm_chart_valid D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name helm_chart_published D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["compatibility", "cert"], found tasks: ["increase_decrease_capacity"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["compatibility", "cert"], increase_decrease_capacity = 100 I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: total_passed: ["compatibility", "cert"] = 1 D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_max_passed tag: ["compatibility", "cert"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:default_scoring, points.tags: D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name cni_compatible D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name increase_decrease_capacity D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name rolling_update D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name rolling_downgrade D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name rolling_version_change D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name rollback D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name helm_deploy D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name helm_chart_valid D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["compatibility"] name helm_chart_published D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:compatibility, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: compatibility D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: total_max_passed tasks: ["increase_decrease_capacity"] I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: failed tests [] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_scoring, points.tags: D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name service_discovery D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_latency D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_corruption D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_duplication D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_io_stress D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name operator_installed D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name secrets_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_configmap D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name no_local_volume_configuration D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name elastic_volumes D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name linux_hardening D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_file_systems D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name ingress_egress_blocked D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name prometheus_traffic D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name open_metrics D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name routed_logs D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name tracing D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: bonus tasks ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: tasks x: increase_decrease_capacity D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_points: task: increase_decrease_capacity is worth: 100 points I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: total_max_passed: ["compatibility", "cert"] = 1 D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_passed: ["essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_scoring, points.tags: D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name specialized_init_system D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name single_process_type D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name zombie_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name sig_term_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name increase_decrease_capacity D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name liveness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name readiness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostport_not_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name node_drain D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name privileged_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name non_root_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name cpu_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name memory_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostpath_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name log_output D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name container_sock_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name selinux_options D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name latest_tag D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], increase_decrease_capacity = 100 I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: total_passed: ["essential"] = 1 D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_max_passed tag: ["essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_scoring, points.tags: D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name specialized_init_system D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name single_process_type D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name zombie_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name sig_term_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name increase_decrease_capacity D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name liveness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name readiness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostport_not_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name node_drain D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name privileged_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name non_root_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name cpu_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name memory_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostpath_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name log_output D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name container_sock_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name selinux_options D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name latest_tag D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: total_max_passed tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: failed tests [] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_scoring, points.tags: D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name service_discovery D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_latency D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_corruption D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_duplication D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_io_stress D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name operator_installed D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name secrets_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_configmap D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name no_local_volume_configuration D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name elastic_volumes D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus Compatibility, installability, and upgradeability results: 1 of 1 tests passed  State Tests D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name linux_hardening D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_file_systems D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name ingress_egress_blocked D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name prometheus_traffic D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name open_metrics D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name routed_logs D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name tracing D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: bonus tasks ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: tasks x: specialized_init_system D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_points: task: specialized_init_system is worth: 100 points I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: tasks x: single_process_type D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_points: task: single_process_type is worth: 100 points I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: tasks x: zombie_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_points: task: zombie_handled is worth: 100 points I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: tasks x: sig_term_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_points: task: sig_term_handled is worth: 100 points I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: tasks x: increase_decrease_capacity D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_points: task: increase_decrease_capacity is worth: 100 points I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: tasks x: liveness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_points: task: liveness is worth: 100 points I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: tasks x: readiness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_points: task: readiness is worth: 100 points I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: tasks x: hostport_not_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_points: task: hostport_not_used is worth: 100 points I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: tasks x: hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_points: task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: tasks x: node_drain D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_points: task: node_drain is worth: 100 points I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: tasks x: privileged_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_points: task: privileged_containers is worth: 100 points I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: tasks x: non_root_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_points: task: non_root_containers is worth: 100 points I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: tasks x: cpu_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_points: task: cpu_limits is worth: 100 points I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: tasks x: memory_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_points: task: memory_limits is worth: 100 points I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: tasks x: hostpath_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_points: task: hostpath_mounts is worth: 100 points I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: tasks x: log_output D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_points: task: log_output is worth: 100 points I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: tasks x: container_sock_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_points: task: container_sock_mounts is worth: 100 points I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: tasks x: selinux_options D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_points: task: selinux_options is worth: 100 points I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: tasks x: latest_tag D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, increase_decrease_capacity = 100 status = passed I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: task_points: task: latest_tag is worth: 100 points I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: total_max_passed: ["essential"] = 19 D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => nil, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}]} D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 100, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}]} D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 100, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}]} D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 100, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}], "maximum_points" => 100} D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:default_scoring, points.tags: D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["state"] name no_local_volume_configuration D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["state"] name elastic_volumes D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["state"] name database_persistence D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["state"] name node_drain D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: install litmus I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Apply.namespace command: kubectl create namespace litmus --dry-run=client -o yaml | kubectl apply -f - D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Apply.namespace output: namespace/litmus created I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite-Label.namespace: command: kubectl label namespace litmus pod-security.kubernetes.io/enforce=privileged D, [2025-03-06 11:53:11 UTC #1422] DEBUG -- cnf-testsuite-Label.namespace: output: namespace/litmus labeled I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: install litmus operator I, [2025-03-06 11:53:11 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Apply.file command: kubectl apply -n litmus -f https://litmuschaos.github.io/litmus/litmus-operator-v3.6.0.yaml D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Apply.file output: namespace/litmus configured serviceaccount/litmus created clusterrole.rbac.authorization.k8s.io/litmus created clusterrolebinding.rbac.authorization.k8s.io/litmus created deployment.apps/chaos-operator-ce created customresourcedefinition.apiextensions.k8s.io/chaosengines.litmuschaos.io created customresourcedefinition.apiextensions.k8s.io/chaosexperiments.litmuschaos.io created customresourcedefinition.apiextensions.k8s.io/chaosresults.litmuschaos.io created I, [2025-03-06 11:53:12 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Apply.file stderr: Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "chaos-operator" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "chaos-operator" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "chaos-operator" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "chaos-operator" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") I, [2025-03-06 11:53:12 UTC #1422] INFO -- cnf-testsuite: task_runner args: # I, [2025-03-06 11:53:12 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:53:12 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" I, [2025-03-06 11:53:12 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:53:12 UTC #1422] INFO -- cnf-testsuite: ensure_cnf_installed? true I, [2025-03-06 11:53:12 UTC #1422] INFO -- cnf-testsuite: check_cnf_config args: # I, [2025-03-06 11:53:12 UTC #1422] INFO -- cnf-testsuite: check_cnf_config cnf: I, [2025-03-06 11:53:12 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:53:12 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [node_drain] I, [2025-03-06 11:53:12 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:53:12 UTC #1422] INFO -- cnf-testsuite: CNF configs found: 1 D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: single_task_runner args: # "installed_cnf_files/cnf-testsuite.yml"}> I, [2025-03-06 11:53:12 UTC #1422] INFO -- cnf-testsuite-node_drain: Starting test D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite-node_drain: cnf_config: # I, [2025-03-06 11:53:12 UTC #1422] INFO -- cnf-testsuite: cnf_resource_ymls I, [2025-03-06 11:53:12 UTC #1422] INFO -- cnf-testsuite: manifest_path_to_ymls file_path: installed_cnf_files/common_manifest.yml I, [2025-03-06 11:53:12 UTC #1422] INFO -- cnf-testsuite: manifest_string_to_ymls D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: manifest_string_to_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: cnf_resource_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:53:12 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Deployment D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"} D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:53:12 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Service D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"} D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: {} D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] I, [2025-03-06 11:53:12 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Pod D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:53:12 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ReplicaSet D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:53:12 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: StatefulSet D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:53:12 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: DaemonSet D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:53:12 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ServiceAccount D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: resources: [] D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: all resource: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}} D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}} D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] I, [2025-03-06 11:53:12 UTC #1422] INFO -- cnf-testsuite: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] I, [2025-03-06 11:53:12 UTC #1422] INFO -- cnf-testsuite-KubectlClient::Get.resource_volumes: Deployment resource_name: coredns-coredns namespace: cnf-default I, [2025-03-06 11:53:12 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 3, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4961474", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "availableReplicas": 1, "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 3, "readyReplicas": 1, "replicas": 1, "updatedReplicas": 1 } } I, [2025-03-06 11:53:12 UTC #1422] INFO -- cnf-testsuite: kubectl get resource volumes: [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}] D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: kubectl get resource containers kind: Deployment resource_name: coredns-coredns namespace: cnf-default I, [2025-03-06 11:53:12 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 3, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4961474", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "availableReplicas": 1, "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 3, "readyReplicas": 1, "replicas": 1, "updatedReplicas": 1 } } D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: kubectl get resource containers: [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}]}] I, [2025-03-06 11:53:12 UTC #1422] INFO -- cnf-testsuite: Current Resource Name: Deployment/coredns-coredns Namespace: cnf-default D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: resource_labels kind: Deployment resource_name: coredns-coredns I, [2025-03-06 11:53:12 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 3, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4961474", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "availableReplicas": 1, "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 3, "readyReplicas": 1, "replicas": 1, "updatedReplicas": 1 } } D, [2025-03-06 11:53:12 UTC #1422] DEBUG -- cnf-testsuite: resource_labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} I, [2025-03-06 11:53:12 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:53:13 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4960827", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4960672", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:53:13 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:53:13 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4960827", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4960672", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:53:13 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:53:13 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4960827", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4960672", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:53:13 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:53:13 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4960827", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4960672", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:53:13 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:53:13 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4960827", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4960672", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:53:13 UTC #1422] DEBUG -- cnf-testsuite: taints: [{"effect" => "NoSchedule", "key" => "node-role.kubernetes.io/control-plane"}] I, [2025-03-06 11:53:13 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:53:13 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4960827", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4960672", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:53:13 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:53:13 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4960827", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4960672", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:53:13 UTC #1422] DEBUG -- cnf-testsuite: taints: I, [2025-03-06 11:53:13 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:53:13 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4960827", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4960672", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:53:13 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:53:14 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4960827", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4960672", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:53:14 UTC #1422] DEBUG -- cnf-testsuite: taints: D, [2025-03-06 11:53:14 UTC #1422] DEBUG -- cnf-testsuite: resource_map items : [{"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker"}, "name" => "v132-worker", "resourceVersion" => "4960827", "uid" => "f5b473ab-dbca-4331-a088-561021e2400f"}, "spec" => {"podCIDR" => "10.244.2.0/24", "podCIDRs" => ["10.244.2.0/24"], "providerID" => "kind://docker/v132/v132-worker"}, "status" => {"addresses" => [{"address" => "172.24.0.9", "type" => "InternalIP"}, {"address" => "v132-worker", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:50:08Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:50:08Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:50:08Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:50:08Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter"], "sizeBytes" => 351519591}, {"names" => ["docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter"], "sizeBytes" => 344304298}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter"], "sizeBytes" => 298627136}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter"], "sizeBytes" => 285504787}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0"], "sizeBytes" => 58057865}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6"], "sizeBytes" => 11555354}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "71e7b586a0c24b35898016e092b898c4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "09103c12-a066-4570-92b0-221c8c39ecb8"}}}, {"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4960672", "uid" => "a499c571-be9e-41e0-a4ea-dc082e96fd5a"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:48:30Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:48:30Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:48:30Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:48:30Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest"], "sizeBytes" => 72080558}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "960341c8-b3a9-4b4a-bb0c-142338daaac6"}}}] D, [2025-03-06 11:53:15 UTC #1422] DEBUG -- cnf-testsuite: nodes: [{"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker"}, "name" => "v132-worker", "resourceVersion" => "4960827", "uid" => "f5b473ab-dbca-4331-a088-561021e2400f"}, "spec" => {"podCIDR" => "10.244.2.0/24", "podCIDRs" => ["10.244.2.0/24"], "providerID" => "kind://docker/v132/v132-worker"}, "status" => {"addresses" => [{"address" => "172.24.0.9", "type" => "InternalIP"}, {"address" => "v132-worker", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:50:08Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:50:08Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:50:08Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:50:08Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter"], "sizeBytes" => 351519591}, {"names" => ["docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter"], "sizeBytes" => 344304298}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter"], "sizeBytes" => 298627136}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter"], "sizeBytes" => 285504787}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0"], "sizeBytes" => 58057865}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6"], "sizeBytes" => 11555354}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "71e7b586a0c24b35898016e092b898c4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "09103c12-a066-4570-92b0-221c8c39ecb8"}}}, {"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4960672", "uid" => "a499c571-be9e-41e0-a4ea-dc082e96fd5a"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:48:30Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:48:30Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:48:30Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:48:30Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest"], "sizeBytes" => 72080558}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "960341c8-b3a9-4b4a-bb0c-142338daaac6"}}}] I, [2025-03-06 11:53:15 UTC #1422] INFO -- cnf-testsuite: Getting the operator node name: kubectl get pods -l app.kubernetes.io/instance=coredns -n cnf-default -o=jsonpath='{.items[0].spec.nodeName}' I, [2025-03-06 11:53:15 UTC #1422] INFO -- cnf-testsuite-verbose: status_code: 0 I, [2025-03-06 11:53:15 UTC #1422] INFO -- cnf-testsuite: Found node to cordon v132-worker using label app.kubernetes.io/instance='coredns' in cnf-default namespace. I, [2025-03-06 11:53:15 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Cordon.command command: kubectl cordon v132-worker D, [2025-03-06 11:53:15 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Cordon.command output: node/v132-worker cordoned I, [2025-03-06 11:53:15 UTC #1422] INFO -- cnf-testsuite: Cordoned node v132-worker successfully. I, [2025-03-06 11:53:15 UTC #1422] INFO -- cnf-testsuite: Workload Node Name: v132-worker I, [2025-03-06 11:53:15 UTC #1422] INFO -- cnf-testsuite: Litmus Node Name: v132-worker I, [2025-03-06 11:53:15 UTC #1422] INFO -- cnf-testsuite: Litmus and the workload are scheduled to the same node. Re-scheduling Litmus I, [2025-03-06 11:53:15 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:53:15 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4961527", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker", "taints": [ { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "timeAdded": "2025-03-06T11:53:15Z" } ], "unschedulable": true }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4960672", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:53:15 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:53:15 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4961527", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker", "taints": [ { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "timeAdded": "2025-03-06T11:53:15Z" } ], "unschedulable": true }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4960672", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:53:15 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:53:15 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4961527", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker", "taints": [ { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "timeAdded": "2025-03-06T11:53:15Z" } ], "unschedulable": true }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4960672", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:53:15 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:53:16 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4961527", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker", "taints": [ { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "timeAdded": "2025-03-06T11:53:15Z" } ], "unschedulable": true }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4960672", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:53:16 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:53:16 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4961527", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker", "taints": [ { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "timeAdded": "2025-03-06T11:53:15Z" } ], "unschedulable": true }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4960672", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:53:16 UTC #1422] DEBUG -- cnf-testsuite: taints: [{"effect" => "NoSchedule", "key" => "node-role.kubernetes.io/control-plane"}] I, [2025-03-06 11:53:16 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:53:16 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4961527", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker", "taints": [ { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "timeAdded": "2025-03-06T11:53:15Z" } ], "unschedulable": true }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4960672", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:53:16 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:53:16 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4961527", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker", "taints": [ { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "timeAdded": "2025-03-06T11:53:15Z" } ], "unschedulable": true }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4960672", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:53:16 UTC #1422] DEBUG -- cnf-testsuite: taints: [{"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "timeAdded" => "2025-03-06T11:53:15Z"}] I, [2025-03-06 11:53:16 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:53:16 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4961527", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker", "taints": [ { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "timeAdded": "2025-03-06T11:53:15Z" } ], "unschedulable": true }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4960672", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:53:16 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:53:16 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4961527", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker", "taints": [ { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "timeAdded": "2025-03-06T11:53:15Z" } ], "unschedulable": true }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:50:08Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4960672", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:48:30Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:53:16 UTC #1422] DEBUG -- cnf-testsuite: taints: D, [2025-03-06 11:53:16 UTC #1422] DEBUG -- cnf-testsuite: resource_map items : [{"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4960672", "uid" => "a499c571-be9e-41e0-a4ea-dc082e96fd5a"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:48:30Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:48:30Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:48:30Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:48:30Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest"], "sizeBytes" => 72080558}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "960341c8-b3a9-4b4a-bb0c-142338daaac6"}}}] D, [2025-03-06 11:53:17 UTC #1422] DEBUG -- cnf-testsuite: nodes: [{"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4960672", "uid" => "a499c571-be9e-41e0-a4ea-dc082e96fd5a"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:48:30Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:48:30Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:48:30Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:48:30Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest"], "sizeBytes" => 72080558}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "960341c8-b3a9-4b4a-bb0c-142338daaac6"}}}] I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:53:17 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: All Schedulable Nodes: [{"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4960672", "uid" => "a499c571-be9e-41e0-a4ea-dc082e96fd5a"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:48:30Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:48:30Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:48:30Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:48:30Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest"], "sizeBytes" => 72080558}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "960341c8-b3a9-4b4a-bb0c-142338daaac6"}}}] I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: Schedulable Node Names: ["v132-worker2"] I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: Schedulable Litmus Nodes: ["v132-worker2"] I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: download: https://litmuschaos.github.io/litmus/litmus-operator-v3.6.0.yaml, litmus-operator-downloaded.yaml I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:53:17 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id: alpine I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:53:17 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:53:17 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:53:17 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:53:17 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:53:17 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: release_id: alpine D, [2025-03-06 11:53:17 UTC #1422] DEBUG -- cnf-testsuite-http.client: Performing request I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: response status: 200 I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: Re-Schedule Litmus I, [2025-03-06 11:53:17 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Apply.file command: kubectl apply -f litmus-operator-modified.yaml D, [2025-03-06 11:53:19 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Apply.file output: namespace/litmus unchanged serviceaccount/litmus unchanged clusterrole.rbac.authorization.k8s.io/litmus unchanged clusterrolebinding.rbac.authorization.k8s.io/litmus unchanged deployment.apps/chaos-operator-ce configured customresourcedefinition.apiextensions.k8s.io/chaosengines.litmuschaos.io configured customresourcedefinition.apiextensions.k8s.io/chaosexperiments.litmuschaos.io configured customresourcedefinition.apiextensions.k8s.io/chaosresults.litmuschaos.io unchanged I, [2025-03-06 11:53:19 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Apply.file stderr: Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "chaos-operator" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "chaos-operator" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "chaos-operator" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "chaos-operator" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") I, [2025-03-06 11:53:19 UTC #1422] INFO -- cnf-testsuite: resource_wait_for_install kind: Deployment resource_name: chaos-operator-ce namespace: litmus kubeconfig: I, [2025-03-06 11:53:19 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=litmus chaos-operator-ce -o=jsonpath='{.status.replicas}' D, [2025-03-06 11:53:19 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 2 I, [2025-03-06 11:53:19 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=litmus chaos-operator-ce -o=jsonpath='{.status.unavailableReplicas}' D, [2025-03-06 11:53:19 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 1 I, [2025-03-06 11:53:19 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=litmus chaos-operator-ce -o=jsonpath='{.status.readyReplicas}' D, [2025-03-06 11:53:19 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 1 I, [2025-03-06 11:53:19 UTC #1422] INFO -- cnf-testsuite: current_replicas: 1, desired_replicas: 2, unavailable_replicas: 1 I, [2025-03-06 11:53:19 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource_wait_for_install attempt: 0; is_ready: false I, [2025-03-06 11:53:20 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=litmus chaos-operator-ce -o=jsonpath='{.status.replicas}' D, [2025-03-06 11:53:20 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 2 I, [2025-03-06 11:53:20 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=litmus chaos-operator-ce -o=jsonpath='{.status.unavailableReplicas}' D, [2025-03-06 11:53:20 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: I, [2025-03-06 11:53:20 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=litmus chaos-operator-ce -o=jsonpath='{.status.readyReplicas}' D, [2025-03-06 11:53:20 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 1 I, [2025-03-06 11:53:20 UTC #1422] INFO -- cnf-testsuite: current_replicas: 1, desired_replicas: 2, unavailable_replicas: -1 I, [2025-03-06 11:53:20 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource_wait_for_install attempt: 1; is_ready: false I, [2025-03-06 11:53:21 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=litmus chaos-operator-ce -o=jsonpath='{.status.replicas}' D, [2025-03-06 11:53:21 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 1 I, [2025-03-06 11:53:21 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=litmus chaos-operator-ce -o=jsonpath='{.status.unavailableReplicas}' D, [2025-03-06 11:53:22 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Deployment --namespace=litmus chaos-operator-ce -o=jsonpath='{.status.readyReplicas}' D, [2025-03-06 11:53:22 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 1 I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: current_replicas: 1, desired_replicas: 1, unavailable_replicas: -1 I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: is_ready kind/resource Deployment, chaos-operator-ce: true I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/3.6.0/faults/kubernetes/node-drain/fault.yaml, node_drain_experiment.yaml I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: chaos_manifests_path I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/node_drain_experiment.yaml I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: download: https://raw.githubusercontent.com/litmuschaos/chaos-charts/3.6.0/faults/kubernetes/node-drain/fault.yaml, /home/xtesting/.cnf-testsuite/tools/chaos-experiments/node_drain_experiment.yaml I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:53:22 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id: alpine I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:53:22 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:53:22 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:53:22 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:53:22 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:53:22 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: release_id: alpine D, [2025-03-06 11:53:22 UTC #1422] DEBUG -- cnf-testsuite-http.client: Performing request I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: response status: 200 I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Apply.file command: kubectl apply -n cnf-default -f /home/xtesting/.cnf-testsuite/tools/chaos-experiments/node_drain_experiment.yaml D, [2025-03-06 11:53:22 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Apply.file output: chaosexperiment.litmuschaos.io/node-drain created I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: download_template url, filename: https://raw.githubusercontent.com/litmuschaos/chaos-charts/2.6.0/charts/generic/node-drain/rbac.yaml, node_drain_rbac.yaml I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: chaos_manifests_path I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: filepath: /home/xtesting/.cnf-testsuite/tools/chaos-experiments/node_drain_rbac.yaml I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: download: https://raw.githubusercontent.com/litmuschaos/chaos-charts/2.6.0/charts/generic/node-drain/rbac.yaml, /home/xtesting/.cnf-testsuite/tools/chaos-experiments/node_drain_rbac.yaml I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:53:22 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id: alpine I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:53:22 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:53:22 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:53:22 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:53:22 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:53:22 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: release_id: alpine D, [2025-03-06 11:53:22 UTC #1422] DEBUG -- cnf-testsuite-http.client: Performing request I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: response status: 200 I, [2025-03-06 11:53:22 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Apply.file command: kubectl apply -f /home/xtesting/.cnf-testsuite/tools/chaos-experiments/node_drain_rbac.yaml D, [2025-03-06 11:53:23 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Apply.file output: serviceaccount/node-drain-sa created clusterrole.rbac.authorization.k8s.io/node-drain-sa unchanged clusterrolebinding.rbac.authorization.k8s.io/node-drain-sa unchanged I, [2025-03-06 11:53:23 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Annotate.run command: kubectl annotate --overwrite -n cnf-default deploy/coredns-coredns litmuschaos.io/chaos="true" D, [2025-03-06 11:53:23 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Annotate.run output: deployment.apps/coredns-coredns annotated I, [2025-03-06 11:53:23 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Annotate.run stderr: Warning: spec.template.metadata.annotations[scheduler.alpha.kubernetes.io/critical-pod]: non-functional in v1.16+; use the "priorityClassName" field instead Warning: would violate PodSecurity "restricted:latest": allowPrivilegeEscalation != false (container "coredns" must set securityContext.allowPrivilegeEscalation=false), unrestricted capabilities (container "coredns" must set securityContext.capabilities.drop=["ALL"]), runAsNonRoot != true (pod or container "coredns" must set securityContext.runAsNonRoot=true), seccompProfile (pod or container "coredns" must set securityContext.seccompProfile.type to "RuntimeDefault" or "Localhost") I, [2025-03-06 11:53:23 UTC #1422] INFO -- cnf-testsuite-node_drain: Chaos test name: coredns-coredns-5b842825; Experiment name: node-drain; Label app.kubernetes.io/instance=coredns; namespace: cnf-default I, [2025-03-06 11:53:23 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Apply.file command: kubectl apply -f installed_cnf_files/temp_files/node-drain-chaosengine.yml D, [2025-03-06 11:53:23 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Apply.file output: chaosengine.litmuschaos.io/coredns-coredns-5b842825 created I, [2025-03-06 11:53:23 UTC #1422] INFO -- cnf-testsuite: wait_for_test: coredns-coredns-5b842825-node-drain I, [2025-03-06 11:53:23 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:53:23 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: I, [2025-03-06 11:53:25 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1798 seconds I, [2025-03-06 11:53:25 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:53:25 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: I, [2025-03-06 11:53:27 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1796 seconds I, [2025-03-06 11:53:27 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:53:27 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: I, [2025-03-06 11:53:29 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1794 seconds I, [2025-03-06 11:53:29 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:53:29 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: I, [2025-03-06 11:53:31 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1792 seconds I, [2025-03-06 11:53:31 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:53:32 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: I, [2025-03-06 11:53:34 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1790 seconds I, [2025-03-06 11:53:34 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:53:34 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: I, [2025-03-06 11:53:36 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1788 seconds I, [2025-03-06 11:53:36 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:53:36 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: I, [2025-03-06 11:53:38 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1786 seconds I, [2025-03-06 11:53:38 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:53:38 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:53:40 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1784 seconds I, [2025-03-06 11:53:40 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:53:40 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:53:42 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1781 seconds I, [2025-03-06 11:53:42 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:53:42 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:53:44 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1779 seconds I, [2025-03-06 11:53:44 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:53:44 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:53:46 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1777 seconds I, [2025-03-06 11:53:46 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:53:46 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:53:48 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1775 seconds I, [2025-03-06 11:53:48 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:53:49 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:53:51 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1773 seconds I, [2025-03-06 11:53:51 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:53:51 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:53:53 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1771 seconds I, [2025-03-06 11:53:53 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:53:53 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:53:55 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1769 seconds I, [2025-03-06 11:53:55 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:53:55 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:53:57 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1767 seconds I, [2025-03-06 11:53:57 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:53:57 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:53:59 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1764 seconds I, [2025-03-06 11:53:59 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:53:59 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:54:01 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1762 seconds I, [2025-03-06 11:54:01 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:54:01 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:54:03 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1760 seconds I, [2025-03-06 11:54:03 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:54:03 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:54:05 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1758 seconds I, [2025-03-06 11:54:05 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:54:05 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:54:07 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1756 seconds I, [2025-03-06 11:54:07 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:54:08 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:54:10 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1754 seconds I, [2025-03-06 11:54:10 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:54:10 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:54:12 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1752 seconds I, [2025-03-06 11:54:12 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:54:12 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:54:14 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1750 seconds I, [2025-03-06 11:54:14 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:54:14 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:54:16 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1748 seconds I, [2025-03-06 11:54:16 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:54:16 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:54:18 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1745 seconds I, [2025-03-06 11:54:18 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:54:18 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:54:20 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1743 seconds I, [2025-03-06 11:54:20 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:54:20 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:54:22 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1741 seconds I, [2025-03-06 11:54:22 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:54:22 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:54:24 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1739 seconds I, [2025-03-06 11:54:24 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:54:25 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:54:27 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1737 seconds I, [2025-03-06 11:54:27 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:54:27 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:54:29 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1735 seconds I, [2025-03-06 11:54:29 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:54:29 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:54:31 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1733 seconds I, [2025-03-06 11:54:31 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:54:31 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:54:33 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1731 seconds I, [2025-03-06 11:54:33 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:54:33 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:54:35 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1728 seconds I, [2025-03-06 11:54:35 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:54:35 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:54:37 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1726 seconds I, [2025-03-06 11:54:37 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:54:37 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:54:39 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1724 seconds I, [2025-03-06 11:54:39 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:54:39 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:54:41 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1722 seconds I, [2025-03-06 11:54:41 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:54:41 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:54:43 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1720 seconds I, [2025-03-06 11:54:43 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:54:44 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:54:46 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1718 seconds I, [2025-03-06 11:54:46 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:54:46 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:54:48 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1716 seconds I, [2025-03-06 11:54:48 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:54:48 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:54:50 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1714 seconds I, [2025-03-06 11:54:50 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:54:50 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:54:52 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1712 seconds I, [2025-03-06 11:54:52 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:54:52 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:54:54 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1709 seconds I, [2025-03-06 11:54:54 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:54:54 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:54:56 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1707 seconds I, [2025-03-06 11:54:56 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:54:56 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:54:58 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1705 seconds I, [2025-03-06 11:54:58 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:54:58 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:55:00 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1703 seconds I, [2025-03-06 11:55:00 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:55:01 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:55:03 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1701 seconds I, [2025-03-06 11:55:03 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:55:03 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:55:05 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1699 seconds I, [2025-03-06 11:55:05 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:55:05 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:55:07 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1697 seconds I, [2025-03-06 11:55:07 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:55:07 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:55:09 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1695 seconds I, [2025-03-06 11:55:09 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:55:09 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:55:11 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1692 seconds I, [2025-03-06 11:55:11 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:55:11 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:55:13 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1690 seconds I, [2025-03-06 11:55:13 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:55:13 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:55:15 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1688 seconds I, [2025-03-06 11:55:15 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:55:15 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:55:17 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1686 seconds I, [2025-03-06 11:55:17 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:55:17 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:55:19 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1684 seconds I, [2025-03-06 11:55:19 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:55:20 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:55:22 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1682 seconds I, [2025-03-06 11:55:22 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:55:22 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:55:24 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1680 seconds I, [2025-03-06 11:55:24 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:55:24 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:55:26 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1678 seconds I, [2025-03-06 11:55:26 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:55:26 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:55:28 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1676 seconds I, [2025-03-06 11:55:28 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:55:28 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:55:30 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1673 seconds I, [2025-03-06 11:55:30 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:55:30 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:55:32 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1671 seconds I, [2025-03-06 11:55:32 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:55:32 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:55:34 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1669 seconds I, [2025-03-06 11:55:34 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:55:34 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:55:36 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1667 seconds I, [2025-03-06 11:55:36 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:55:37 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:55:39 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1665 seconds I, [2025-03-06 11:55:39 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:55:39 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:55:41 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1663 seconds I, [2025-03-06 11:55:41 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:55:41 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:55:43 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1661 seconds I, [2025-03-06 11:55:43 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:55:43 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:55:45 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1659 seconds I, [2025-03-06 11:55:45 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:55:45 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:55:47 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1656 seconds I, [2025-03-06 11:55:47 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:55:47 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:55:49 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1654 seconds I, [2025-03-06 11:55:49 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:55:49 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:55:51 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1652 seconds I, [2025-03-06 11:55:51 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:55:51 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:55:53 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1650 seconds I, [2025-03-06 11:55:53 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:55:54 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:55:56 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1648 seconds I, [2025-03-06 11:55:56 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:55:56 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:55:58 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1646 seconds I, [2025-03-06 11:55:58 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:55:58 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:56:00 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1644 seconds I, [2025-03-06 11:56:00 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:56:00 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:56:02 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1642 seconds I, [2025-03-06 11:56:02 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:56:02 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:56:04 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1639 seconds I, [2025-03-06 11:56:04 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:56:04 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:56:06 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1637 seconds I, [2025-03-06 11:56:06 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:56:06 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:56:08 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1635 seconds I, [2025-03-06 11:56:08 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:56:08 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:56:10 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1633 seconds I, [2025-03-06 11:56:10 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:56:10 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: initialized I, [2025-03-06 11:56:12 UTC #1422] INFO -- cnf-testsuite-verbose: Time left: 1631 seconds I, [2025-03-06 11:56:12 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosengine.litmuschaos.io coredns-coredns-5b842825 -n cnf-default -o 'jsonpath={.status.engineStatus}' I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: completed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosresults.litmuschaos.io coredns-coredns-5b842825-node-drain -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: Pass I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: Getting litmus status info: kubectl get chaosresult.litmuschaos.io coredns-coredns-5b842825-node-drain -n cnf-default -o 'jsonpath={.status.experimentStatus.verdict}' I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: status_code: 0, response: Pass I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Uncordon.command command: kubectl uncordon v132-worker ✔️ 🏆PASSED: [node_drain] node_drain chaos test passed 🗡️💀♻ D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Uncordon.command output: node/v132-worker already uncordoned I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: Uncordoned node v132-worker successfully. D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: yield resp: true I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite-KubectlClient::Get.resource_volumes: Service resource_name: coredns-coredns namespace: cnf-default D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: workload resource test intialized: true test_passed: true D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: task node_drain emoji: 🗡️💀♻ I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "node_drain", "emoji" => "🗡️💀♻", "tags" => ["state", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["state", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: resp: ["state", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_type x: state acc: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_points: task: node_drain is worth: 100 points I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: cmd: /usr/local/bin/cnf-testsuite cert I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite-node_drain: task_runtime=00:03:00.793249660; start_time=2025-03-06 11:53:12 UTC; end_time:2025-03-06 11:56:13 UTC I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "node_drain", "emoji" => "🗡️💀♻", "tags" => ["state", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["state", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: resp: ["state", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_type x: state acc: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: upsert_task: task: node_drain has status: passed and is awarded: 100 points. Runtime: 00:03:00.793249660 D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["state"] name no_local_volume_configuration D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["state"] name elastic_volumes D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["state"] name database_persistence D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["state"] name node_drain D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["state", "cert"], found tasks: ["node_drain"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["state", "cert"], increase_decrease_capacity = 100 D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["state", "cert"], node_drain = 100 I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: total_points: ["state", "cert"] = 100 D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_max_points tag: ["state", "cert"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["state"] name no_local_volume_configuration D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["state"] name elastic_volumes D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["state"] name database_persistence D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["state"] name node_drain D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks - bonus tasks: 1 I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: skipped tests [] I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: failed tests [] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name service_discovery D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_latency D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_corruption D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_duplication D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_io_stress D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name operator_installed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name secrets_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_configmap D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name no_local_volume_configuration D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name elastic_volumes D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name linux_hardening D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_file_systems D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name ingress_egress_blocked D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name prometheus_traffic D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name open_metrics D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name routed_logs D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name tracing D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: bonus tasks ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task reduce x: node_drain I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_points: task: node_drain is worth: 100 points I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: total_max_points: ["state", "cert"] = 100 D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_passed: ["state", "cert"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["state"] name no_local_volume_configuration D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["state"] name elastic_volumes D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["state"] name database_persistence D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["state"] name node_drain D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["state", "cert"], found tasks: ["node_drain"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["state", "cert"], increase_decrease_capacity = 100 D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["state", "cert"], node_drain = 100 I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: total_passed: ["state", "cert"] = 1 D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_max_passed tag: ["state", "cert"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["state"] name no_local_volume_configuration D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["state"] name elastic_volumes D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["state"] name database_persistence D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["state"] name node_drain D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:state, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: state D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: total_max_passed tasks: ["node_drain"] I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: failed tests [] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name service_discovery D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_latency D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_corruption D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_duplication D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_io_stress D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name operator_installed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name secrets_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_configmap D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name no_local_volume_configuration D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name elastic_volumes D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name linux_hardening D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_file_systems D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name ingress_egress_blocked D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name prometheus_traffic D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name open_metrics D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name routed_logs D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name tracing D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: bonus tasks ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: tasks x: node_drain D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_points: task: node_drain is worth: 100 points I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: total_max_passed: ["state", "cert"] = 1 D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_passed: ["essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name specialized_init_system D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name single_process_type D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name zombie_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name sig_term_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name increase_decrease_capacity D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name liveness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name readiness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostport_not_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name node_drain D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name privileged_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name non_root_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name cpu_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name memory_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostpath_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name log_output D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name container_sock_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name selinux_options D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name latest_tag D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], increase_decrease_capacity = 100 D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], node_drain = 100 I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: total_passed: ["essential"] = 2 D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_max_passed tag: ["essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name specialized_init_system D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name single_process_type D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name zombie_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name sig_term_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name increase_decrease_capacity D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name liveness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name readiness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostport_not_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name node_drain D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name privileged_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name non_root_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name cpu_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name memory_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostpath_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name log_output D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name container_sock_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name selinux_options D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name latest_tag D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: total_max_passed tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: failed tests [] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name service_discovery D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_latency D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_corruption D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_duplication D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_io_stress D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name operator_installed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name secrets_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_configmap D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name no_local_volume_configuration D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name elastic_volumes D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus State results: 1 of 1 tests passed  Security Tests D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name linux_hardening D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_file_systems D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name ingress_egress_blocked D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name prometheus_traffic D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name open_metrics D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name routed_logs D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name tracing D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: bonus tasks ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: tasks x: specialized_init_system D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_points: task: specialized_init_system is worth: 100 points I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: tasks x: single_process_type D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_points: task: single_process_type is worth: 100 points I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: tasks x: zombie_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_points: task: zombie_handled is worth: 100 points I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: tasks x: sig_term_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_points: task: sig_term_handled is worth: 100 points I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: tasks x: increase_decrease_capacity D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_points: task: increase_decrease_capacity is worth: 100 points I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: tasks x: liveness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_points: task: liveness is worth: 100 points I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: tasks x: readiness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_points: task: readiness is worth: 100 points I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: tasks x: hostport_not_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_points: task: hostport_not_used is worth: 100 points I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: tasks x: hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_points: task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: tasks x: node_drain D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_points: task: node_drain is worth: 100 points I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: tasks x: privileged_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_points: task: privileged_containers is worth: 100 points I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: tasks x: non_root_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_points: task: non_root_containers is worth: 100 points I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: tasks x: cpu_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_points: task: cpu_limits is worth: 100 points I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: tasks x: memory_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_points: task: memory_limits is worth: 100 points I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: tasks x: hostpath_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_points: task: hostpath_mounts is worth: 100 points I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: tasks x: log_output D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_points: task: log_output is worth: 100 points I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: tasks x: container_sock_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_points: task: container_sock_mounts is worth: 100 points I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: tasks x: selinux_options D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_points: task: selinux_options is worth: 100 points I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: tasks x: latest_tag D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, node_drain = 100 status = passed I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_points: task: latest_tag is worth: 100 points I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: total_max_passed: ["essential"] = 19 D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 100, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}]} D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 100, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}]} D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 100, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}]} D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 100, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}], "maximum_points" => 100} D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name privilege_escalation D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name symlink_file_system D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name application_credentials D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name host_network D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name service_account_mapping D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name privileged_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name non_root_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name host_pid_ipc_privileges D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name linux_hardening D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name cpu_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name memory_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name immutable_file_systems D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name hostpath_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name ingress_egress_blocked D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name insecure_capabilities D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name sysctls D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name container_sock_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name external_ips D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name selinux_options D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: task_runner args: # I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: ensure_cnf_installed? true I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: check_cnf_config args: # I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: check_cnf_config cnf: I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [privileged_containers] I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: CNF configs found: 1 D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: single_task_runner args: # "installed_cnf_files/cnf-testsuite.yml"}> I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite-privileged_containers: Starting test D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite-privileged_containers: cnf_config: # I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: cnf_resource_ymls I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: manifest_path_to_ymls file_path: installed_cnf_files/common_manifest.yml I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: manifest_string_to_ymls D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: manifest_string_to_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: cnf_resource_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Deployment D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"} D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Service D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"} D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: {} D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Pod D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ReplicaSet D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: StatefulSet D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: DaemonSet D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ServiceAccount D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: resources: [] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: all resource: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}} D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}} D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite-KubectlClient::Get.resource_volumes: Deployment resource_name: coredns-coredns namespace: cnf-default I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "litmuschaos.io/chaos": "true", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 4, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4961737", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "availableReplicas": 1, "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 4, "readyReplicas": 1, "replicas": 1, "updatedReplicas": 1 } } I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: kubectl get resource volumes: [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: kubectl get resource containers kind: Deployment resource_name: coredns-coredns namespace: cnf-default I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "litmuschaos.io/chaos": "true", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 4, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4961737", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "availableReplicas": 1, "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 4, "readyReplicas": 1, "replicas": 1, "updatedReplicas": 1 } } D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: kubectl get resource containers: [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}]}] I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.privileged_containers command: kubectl get pods --all-namespaces -o jsonpath='{.items[*].spec.containers[?(@.securityContext.privileged==true)].name}' D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.privileged_containers output: cluster-tools cluster-tools loopdev loopdev loopdev kube-proxy kube-proxy kube-proxy D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: kubectl get privileged_containers: ["cluster-tools", "loopdev", "kube-proxy"] D, [2025-03-06 11:56:13 UTC #1422] DEBUG -- cnf-testsuite: kubectl get resource containers kind: Deployment resource_name: coredns-coredns namespace: cnf-default I, [2025-03-06 11:56:13 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default ✔️ 🏆PASSED: [privileged_containers] No privileged containers 🔓🔑 D, [2025-03-06 11:56:14 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "litmuschaos.io/chaos": "true", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 4, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4961737", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "availableReplicas": 1, "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 4, "readyReplicas": 1, "replicas": 1, "updatedReplicas": 1 } } D, [2025-03-06 11:56:14 UTC #1422] DEBUG -- cnf-testsuite: kubectl get resource containers: [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}]}] D, [2025-03-06 11:56:14 UTC #1422] DEBUG -- cnf-testsuite: yield resp: true I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite-KubectlClient::Get.resource_volumes: Service resource_name: coredns-coredns namespace: cnf-default D, [2025-03-06 11:56:14 UTC #1422] DEBUG -- cnf-testsuite: workload resource test intialized: true test_passed: true D, [2025-03-06 11:56:14 UTC #1422] DEBUG -- cnf-testsuite: violator list: [] D, [2025-03-06 11:56:14 UTC #1422] DEBUG -- cnf-testsuite: task privileged_containers emoji: 🔓🔑 I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "privileged_containers", "emoji" => "🔓🔑", "tags" => ["security", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:56:14 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["security", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: resp: ["security", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: task_type x: security acc: I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: task_points: task: privileged_containers is worth: 100 points I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: cmd: /usr/local/bin/cnf-testsuite cert I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite-privileged_containers: task_runtime=00:00:00.466753928; start_time=2025-03-06 11:56:13 UTC; end_time:2025-03-06 11:56:14 UTC I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "privileged_containers", "emoji" => "🔓🔑", "tags" => ["security", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:56:14 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["security", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: resp: ["security", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: task_type x: security acc: I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: upsert_task: task: privileged_containers has status: passed and is awarded: 100 points. Runtime: 00:00:00.466753928 I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: kubescape_framework_download I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: download_auth: https://github.com/armosec/regolibrary/releases/download/v1.0.316/nsa, /home/xtesting/.cnf-testsuite/tools/kubescape/nsa.json I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:56:14 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id: alpine I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:56:14 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:56:14 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:56:14 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:56:14 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:56:14 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:56:14 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id: alpine I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:56:14 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:56:14 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:56:14 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:56:14 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:56:14 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:56:14 UTC #1422] INFO -- cnf-testsuite: release_id: alpine D, [2025-03-06 11:56:14 UTC #1422] DEBUG -- cnf-testsuite-http.client: Performing request D, [2025-03-06 11:56:14 UTC #1422] DEBUG -- cnf-testsuite-http.client: Performing request D, [2025-03-06 11:56:14 UTC #1422] DEBUG -- cnf-testsuite-http.client: Performing request D, [2025-03-06 11:56:14 UTC #1422] DEBUG -- cnf-testsuite-http.client: Performing request I, [2025-03-06 11:56:15 UTC #1422] INFO -- cnf-testsuite: install_kubescape I, [2025-03-06 11:56:15 UTC #1422] INFO -- cnf-testsuite: write_file: /home/xtesting/.cnf-testsuite/tools/kubescape/kubescape I, [2025-03-06 11:56:15 UTC #1422] INFO -- cnf-testsuite: kubescape install I, [2025-03-06 11:56:15 UTC #1422] INFO -- cnf-testsuite: url: https://github.com/armosec/kubescape/releases/download/v3.0.8/kubescape-ubuntu-latest I, [2025-03-06 11:56:15 UTC #1422] INFO -- cnf-testsuite: download: https://github.com/armosec/kubescape/releases/download/v3.0.8/kubescape-ubuntu-latest, /home/xtesting/.cnf-testsuite/tools/kubescape/kubescape I, [2025-03-06 11:56:15 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:56:15 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:56:15 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:56:15 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:56:15 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:56:15 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id: alpine I, [2025-03-06 11:56:15 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:56:15 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:56:15 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:56:15 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:56:15 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:56:15 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:56:15 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:56:15 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:56:15 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:56:15 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:56:15 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:56:15 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:56:15 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:56:15 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:56:15 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:56:15 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:56:15 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:56:15 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:56:15 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:56:15 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:56:15 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:56:15 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:56:15 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:56:15 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:56:15 UTC #1422] INFO -- cnf-testsuite: release_id: alpine D, [2025-03-06 11:56:15 UTC #1422] DEBUG -- cnf-testsuite-http.client: Performing request D, [2025-03-06 11:56:15 UTC #1422] DEBUG -- cnf-testsuite-http.client: Performing request D, [2025-03-06 11:56:15 UTC #1422] DEBUG -- cnf-testsuite-http.client: Performing request I, [2025-03-06 11:56:16 UTC #1422] INFO -- cnf-testsuite: response status: 200 D, [2025-03-06 11:56:19 UTC #1422] DEBUG -- cnf-testsuite-http.client: Performing request I, [2025-03-06 11:56:20 UTC #1422] INFO -- cnf-testsuite: response status: 200 I, [2025-03-06 11:56:22 UTC #1422] INFO -- cnf-testsuite: scan command: /home/xtesting/.cnf-testsuite/tools/kubescape/kubescape scan framework nsa --use-from /home/xtesting/.cnf-testsuite/tools/kubescape/nsa.json --output kubescape_results.json --format json --format-version=v1 --exclude-namespaces kube-system,kube-public,kube-node-lease,local-path-storage,litmus,cnf-testsuite I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: output: ────────────────────────────────────────────────── Framework scanned: NSA ┌─────────────────┬────┐ │ Controls │ 25 │ │ Passed │ 11 │ │ Failed │ 9 │ │ Action Required │ 5 │ └─────────────────┴────┘ Failed resources by severity: ┌──────────┬────┐ │ Critical │ 0 │ │ High │ 0 │ │ Medium │ 11 │ │ Low │ 1 │ └──────────┴────┘ Run with '--verbose'/'-v' to see control failures for each resource. ┌──────────┬────────────────────────────────────────────────────┬──────────────────┬───────────────┬────────────────────┐ │ Severity │ Control name │ Failed resources │ All Resources │ Compliance score │ ├──────────┼────────────────────────────────────────────────────┼──────────────────┼───────────────┼────────────────────┤ │ Critical │ Disable anonymous access to Kubelet service │ 0 │ 0 │ Action Required ** │ │ Critical │ Enforce Kubelet client TLS authentication │ 0 │ 0 │ Action Required ** │ │ Medium │ Prevent containers from allowing command execution │ 2 │ 63 │ 97% │ │ Medium │ Non-root containers │ 1 │ 1 │ 0% │ │ Medium │ Allow privilege escalation │ 1 │ 1 │ 0% │ │ Medium │ Ingress and Egress blocked │ 1 │ 1 │ 0% │ │ Medium │ Automatic mapping of service account │ 3 │ 4 │ 25% │ │ Medium │ Administrative Roles │ 1 │ 63 │ 98% │ │ Medium │ Cluster internal networking │ 1 │ 2 │ 50% │ │ Medium │ Linux hardening │ 1 │ 1 │ 0% │ │ Medium │ Secret/etcd encryption enabled │ 0 │ 0 │ Action Required * │ │ Medium │ Audit logs enabled │ 0 │ 0 │ Action Required * │ │ Low │ Immutable container filesystem │ 1 │ 1 │ 0% │ │ Low │ PSP enabled │ 0 │ 0 │ Action Required * │ ├──────────┼────────────────────────────────────────────────────┼──────────────────┼───────────────┼────────────────────┤ │ │ Resource Summary │ 6 │ 72 │ 54.81% │ └──────────┴────────────────────────────────────────────────────┴──────────────────┴───────────────┴────────────────────┘ 🚨 * failed to get cloud provider, cluster: kind-v132 🚨 ** This control is scanned exclusively by the Kubescape operator, not the Kubescape CLI. Install the Kubescape operator: https://kubescape.io/docs/install-operator/. I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: stderr: {"level":"info","ts":"2025-03-06T11:56:22Z","msg":"Kubescape scanner initializing..."} {"level":"warn","ts":"2025-03-06T11:56:23Z","msg":"current version 'v3.0.8' is not updated to the latest release: 'v3.0.15'"} {"level":"warn","ts":"2025-03-06T11:56:23Z","msg":"Deprecated format version","run":"--format-version=v2"} {"level":"info","ts":"2025-03-06T11:56:28Z","msg":"Initialized scanner"} {"level":"info","ts":"2025-03-06T11:56:28Z","msg":"Loading policies..."} {"level":"info","ts":"2025-03-06T11:56:28Z","msg":"Loaded policies"} {"level":"info","ts":"2025-03-06T11:56:28Z","msg":"Loading exceptions..."} {"level":"info","ts":"2025-03-06T11:56:28Z","msg":"Loaded exceptions"} {"level":"info","ts":"2025-03-06T11:56:28Z","msg":"Loading account configurations..."} {"level":"info","ts":"2025-03-06T11:56:28Z","msg":"Loaded account configurations"} {"level":"info","ts":"2025-03-06T11:56:28Z","msg":"Accessing Kubernetes objects..."} {"level":"info","ts":"2025-03-06T11:56:28Z","msg":"Accessed Kubernetes objects"} {"level":"info","ts":"2025-03-06T11:56:28Z","msg":"Scanning","Cluster":"kind-v132"} {"level":"info","ts":"2025-03-06T11:56:29Z","msg":"Done scanning","Cluster":"kind-v132"} {"level":"info","ts":"2025-03-06T11:56:29Z","msg":"Done aggregating results"} {"level":"info","ts":"2025-03-06T11:56:29Z","msg":"Scan results saved","filename":"kubescape_results.json"} Overall compliance-score (100- Excellent, 0- All failed): 55 I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_runner args: # I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: ensure_cnf_installed? true I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: check_cnf_config args: # I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: check_cnf_config cnf: I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [non_root_containers] Failed resource: Deployment coredns-coredns in cnf-default namespace Remediation: If your application does not need root privileges, make sure to define runAsNonRoot as true or explicitly set the runAsUser using ID 1000 or higher under the PodSecurityContext or container securityContext. In addition, set an explicit value for runAsGroup using ID 1000 or higher. ✖️ 🏆FAILED: [non_root_containers] Found containers running with root user or user with root group membership 🔓🔑 I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: CNF configs found: 1 D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: single_task_runner args: # "installed_cnf_files/cnf-testsuite.yml"}> I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite-non_root_containers: Starting test D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite-non_root_containers: cnf_config: # I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: kubescape parse I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: kubescape test_by_test_name I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: cnf_resource_ymls I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: manifest_path_to_ymls file_path: installed_cnf_files/common_manifest.yml I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: manifest_string_to_ymls D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: manifest_string_to_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: cnf_resource_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Deployment D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"} D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Service D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"} D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: {} D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Pod D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ReplicaSet D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: StatefulSet D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: DaemonSet D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ServiceAccount D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: resources: [] D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: all resource: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: cnf-default,deployment/coredns-coredns D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: cnf-default,service/coredns-coredns D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: task non_root_containers emoji: 🔓🔑 I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "non_root_containers", "emoji" => "🔓🔑", "tags" => ["security", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["security", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: resp: ["security", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type x: security acc: I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: cmd: /usr/local/bin/cnf-testsuite cert I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite-non_root_containers: task_runtime=00:00:00.030834009; start_time=2025-03-06 11:56:29 UTC; end_time:2025-03-06 11:56:29 UTC I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "non_root_containers", "emoji" => "🔓🔑", "tags" => ["security", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["security", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: resp: ["security", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type x: security acc: I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: upsert_task: task: non_root_containers has status: failed and is awarded: 0 points. Runtime: 00:00:00.030834009 I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_runner args: # I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: ensure_cnf_installed? true I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: check_cnf_config args: # I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: check_cnf_config cnf: I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [cpu_limits] ✔️ 🏆PASSED: [cpu_limits] Containers have CPU limits set 🔓🔑 I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: CNF configs found: 1 D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: single_task_runner args: # "installed_cnf_files/cnf-testsuite.yml"}> I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite-cpu_limits: Starting test D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite-cpu_limits: cnf_config: # I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: kubescape parse I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: kubescape test_by_test_name I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: cnf_resource_ymls I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: manifest_path_to_ymls file_path: installed_cnf_files/common_manifest.yml I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: manifest_string_to_ymls D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: manifest_string_to_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: cnf_resource_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Deployment D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"} D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Service D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"} D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: {} D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Pod D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ReplicaSet D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: StatefulSet D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: DaemonSet D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ServiceAccount D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: resources: [] D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: all resource: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: cnf-default,deployment/coredns-coredns D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: cnf-default,service/coredns-coredns D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: task cpu_limits emoji: 🔓🔑 I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "cpu_limits", "emoji" => "🔓🔑", "tags" => ["security", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["security", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: resp: ["security", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type x: security acc: I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_points: task: cpu_limits is worth: 100 points I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: cmd: /usr/local/bin/cnf-testsuite cert I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite-cpu_limits: task_runtime=00:00:00.033892142; start_time=2025-03-06 11:56:29 UTC; end_time:2025-03-06 11:56:29 UTC I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "cpu_limits", "emoji" => "🔓🔑", "tags" => ["security", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["security", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: resp: ["security", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type x: security acc: I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: upsert_task: task: cpu_limits has status: passed and is awarded: 100 points. Runtime: 00:00:00.033892142 I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_runner args: # I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: ensure_cnf_installed? true I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: check_cnf_config args: # I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: check_cnf_config cnf: I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [memory_limits] ✔️ 🏆PASSED: [memory_limits] Containers have memory limits set 🔓🔑 I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: CNF configs found: 1 D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: single_task_runner args: # "installed_cnf_files/cnf-testsuite.yml"}> I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite-memory_limits: Starting test D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite-memory_limits: cnf_config: # I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: kubescape parse I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: kubescape test_by_test_name I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: cnf_resource_ymls I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: manifest_path_to_ymls file_path: installed_cnf_files/common_manifest.yml I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: manifest_string_to_ymls D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: manifest_string_to_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: cnf_resource_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Deployment D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"} D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Service D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"} D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: {} D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Pod D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ReplicaSet D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: StatefulSet D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: DaemonSet D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ServiceAccount D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: resources: [] D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: all resource: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: cnf-default,deployment/coredns-coredns D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: cnf-default,service/coredns-coredns D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: task memory_limits emoji: 🔓🔑 I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "memory_limits", "emoji" => "🔓🔑", "tags" => ["security", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["security", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: resp: ["security", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type x: security acc: I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_points: task: memory_limits is worth: 100 points I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: cmd: /usr/local/bin/cnf-testsuite cert I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite-memory_limits: task_runtime=00:00:00.027870794; start_time=2025-03-06 11:56:29 UTC; end_time:2025-03-06 11:56:29 UTC I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "memory_limits", "emoji" => "🔓🔑", "tags" => ["security", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["security", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: resp: ["security", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type x: security acc: I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: upsert_task: task: memory_limits has status: passed and is awarded: 100 points. Runtime: 00:00:00.027870794 I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: task_runner args: # I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: ensure_cnf_installed? true I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: check_cnf_config args: # I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: check_cnf_config cnf: I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [hostpath_mounts] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: CNF configs found: 1 D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite: single_task_runner args: # "installed_cnf_files/cnf-testsuite.yml"}> I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite-hostpath_mounts: Starting test D, [2025-03-06 11:56:29 UTC #1422] DEBUG -- cnf-testsuite-hostpath_mounts: cnf_config: # I, [2025-03-06 11:56:29 UTC #1422] INFO -- cnf-testsuite: scan command: /home/xtesting/.cnf-testsuite/tools/kubescape/kubescape scan control C-0048 --output kubescape_C-0048_results.json --format json --format-version=v1 --exclude-namespaces kube-system,kube-public,kube-node-lease,local-path-storage,litmus,cnf-testsuite ✔️ 🏆PASSED: [hostpath_mounts] Containers do not have hostPath mounts 🔓🔑 I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: output: ────────────────────────────────────────────────── ┌─────────────────┬───┐ │ Controls │ 1 │ │ Passed │ 1 │ │ Failed │ 0 │ │ Action Required │ 0 │ └─────────────────┴───┘ Failed resources by severity: ┌──────────┬───┐ │ Critical │ 0 │ │ High │ 0 │ │ Medium │ 0 │ │ Low │ 0 │ └──────────┴───┘ Run with '--verbose'/'-v' to see control failures for each resource. ┌──────────┬──────────────────┬──────────────────┬───────────────┬──────────────────┐ │ Severity │ Control name │ Failed resources │ All Resources │ Compliance score │ ├──────────┼──────────────────┼──────────────────┼───────────────┼──────────────────┤ │ High │ HostPath mount │ 0 │ 1 │ 100% │ ├──────────┼──────────────────┼──────────────────┼───────────────┼──────────────────┤ │ │ Resource Summary │ 0 │ 1 │ 100.00% │ └──────────┴──────────────────┴──────────────────┴───────────────┴──────────────────┘ I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: stderr: {"level":"info","ts":"2025-03-06T11:56:29Z","msg":"Kubescape scanner initializing..."} {"level":"warn","ts":"2025-03-06T11:56:30Z","msg":"current version 'v3.0.8' is not updated to the latest release: 'v3.0.15'"} {"level":"warn","ts":"2025-03-06T11:56:30Z","msg":"Deprecated format version","run":"--format-version=v2"} {"level":"info","ts":"2025-03-06T11:56:34Z","msg":"Initialized scanner"} {"level":"info","ts":"2025-03-06T11:56:34Z","msg":"Loading policies..."} {"level":"info","ts":"2025-03-06T11:56:34Z","msg":"Loaded policies"} {"level":"info","ts":"2025-03-06T11:56:34Z","msg":"Loading exceptions..."} {"level":"info","ts":"2025-03-06T11:56:34Z","msg":"Loaded exceptions"} {"level":"info","ts":"2025-03-06T11:56:34Z","msg":"Loading account configurations..."} {"level":"info","ts":"2025-03-06T11:56:34Z","msg":"Loaded account configurations"} {"level":"info","ts":"2025-03-06T11:56:34Z","msg":"Accessing Kubernetes objects..."} {"level":"info","ts":"2025-03-06T11:56:34Z","msg":"Accessed Kubernetes objects"} {"level":"info","ts":"2025-03-06T11:56:34Z","msg":"Scanning","Cluster":"kind-v132"} {"level":"info","ts":"2025-03-06T11:56:34Z","msg":"Done scanning","Cluster":"kind-v132"} {"level":"info","ts":"2025-03-06T11:56:34Z","msg":"Done aggregating results"} {"level":"info","ts":"2025-03-06T11:56:34Z","msg":"Scan results saved","filename":"kubescape_C-0048_results.json"} Overall compliance-score (100- Excellent, 0- All failed): 100 {"level":"info","ts":"2025-03-06T11:56:34Z","msg":"Run with '--verbose'/'-v' flag for detailed resources view\n"} I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: kubescape parse I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: kubescape test_by_test_name I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: cnf_resource_ymls I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: manifest_path_to_ymls file_path: installed_cnf_files/common_manifest.yml I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: manifest_string_to_ymls D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: manifest_string_to_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: cnf_resource_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Deployment D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"} D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Service D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"} D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: {} D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Pod D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ReplicaSet D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: StatefulSet D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: DaemonSet D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ServiceAccount D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: resources: [] D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: all resource: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: cnf-default,deployment/coredns-coredns D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: cnf-default,service/coredns-coredns D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: task hostpath_mounts emoji: 🔓🔑 I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "hostpath_mounts", "emoji" => "🔓🔑", "tags" => ["security", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["security", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: resp: ["security", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: task_type x: security acc: I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: task_points: task: hostpath_mounts is worth: 100 points I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: cmd: /usr/local/bin/cnf-testsuite cert I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite-hostpath_mounts: task_runtime=00:00:05.250478806; start_time=2025-03-06 11:56:29 UTC; end_time:2025-03-06 11:56:34 UTC I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "hostpath_mounts", "emoji" => "🔓🔑", "tags" => ["security", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["security", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: resp: ["security", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: task_type x: security acc: I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: upsert_task: task: hostpath_mounts has status: passed and is awarded: 100 points. Runtime: 00:00:05.250478806 I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: task_runner args: # I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: ensure_cnf_installed? true I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: check_cnf_config args: # I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: check_cnf_config cnf: I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [container_sock_mounts] I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: CNF configs found: 1 D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: single_task_runner args: # "installed_cnf_files/cnf-testsuite.yml"}> I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite-container_sock_mounts: Starting test D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite-container_sock_mounts: cnf_config: # I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: download: https://github.com/kyverno/kyverno/releases/download/v1.8.4/kyverno-cli_v1.8.4_linux_x86_64.tar.gz, /tmp/kyvernoadapq9pu.tar.gz I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id: alpine I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: release_id: alpine I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release_id I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: KernelIntrospection.os_release D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite: os-release: NAME="Alpine Linux" ID=alpine VERSION_ID=3.20.5 PRETTY_NAME="Alpine Linux v3.20" HOME_URL="https://alpinelinux.org/" BUG_REPORT_URL="https://gitlab.alpinelinux.org/alpine/aports/-/issues" I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: os_release: {"NAME" => "\"Alpine Linux\"", "ID" => "alpine", "VERSION_ID" => "3.20.5", "PRETTY_NAME" => "\"Alpine Linux v3.20\"", "HOME_URL" => "\"https://alpinelinux.org/\"", "BUG_REPORT_URL" => "\"https://gitlab.alpinelinux.org/alpine/aports/-/issues\""} I, [2025-03-06 11:56:34 UTC #1422] INFO -- cnf-testsuite: release_id: alpine D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite-http.client: Performing request D, [2025-03-06 11:56:34 UTC #1422] DEBUG -- cnf-testsuite-http.client: Performing request I, [2025-03-06 11:56:35 UTC #1422] INFO -- cnf-testsuite: response status: 200 I, [2025-03-06 11:56:35 UTC #1422] INFO -- cnf-testsuite: TarClient.untar command: tar -xvf /tmp/kyvernoadapq9pu.tar.gz -C /home/xtesting/.cnf-testsuite/tools I, [2025-03-06 11:56:36 UTC #1422] INFO -- cnf-testsuite: TarClient.untar output: LICENSE kyverno I, [2025-03-06 11:56:36 UTC #1422] INFO -- cnf-testsuite: TarClient.untar stderr: I, [2025-03-06 11:56:36 UTC #1422] INFO -- cnf-testsuite: GitClient.clone command: --branch release-1.9 https://github.com/kyverno/policies.git /home/xtesting/.cnf-testsuite/tools/kyverno-policies I, [2025-03-06 11:56:38 UTC #1422] INFO -- cnf-testsuite: GitClient.clone output: I, [2025-03-06 11:56:38 UTC #1422] INFO -- cnf-testsuite: GitClient.clone stderr: Cloning into '/home/xtesting/.cnf-testsuite/tools/kyverno-policies'... I, [2025-03-06 11:56:38 UTC #1422] INFO -- cnf-testsuite-kyverno_policy_path: command: ls /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/disallow_cri_sock_mount/disallow_cri_sock_mount.yaml I, [2025-03-06 11:56:38 UTC #1422] INFO -- cnf-testsuite-kyverno_policy_path: output: /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/disallow_cri_sock_mount/disallow_cri_sock_mount.yaml I, [2025-03-06 11:56:38 UTC #1422] INFO -- cnf-testsuite-Kyverno::PolicyAudit.run: command: /home/xtesting/.cnf-testsuite/tools/kyverno apply /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/disallow_cri_sock_mount/disallow_cri_sock_mount.yaml --cluster --policy-report ✔️ 🏆PASSED: [container_sock_mounts] Container engine daemon sockets are not mounted as volumes 🔓🔑 I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite-Kyverno::PolicyAudit.run: output: Applying 3 policy rules to 28 resources... ---------------------------------------------------------------------- POLICY REPORT: ---------------------------------------------------------------------- apiVersion: wgpolicyk8s.io/v1alpha2 kind: ClusterPolicyReport metadata: name: clusterpolicyreport results: - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-4s8ph namespace: kube-system uid: 0f87ae31-f6df-43d6-b42a-0236e849318a result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-4s8ph namespace: kube-system uid: 0f87ae31-f6df-43d6-b42a-0236e849318a result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-4s8ph namespace: kube-system uid: 0f87ae31-f6df-43d6-b42a-0236e849318a result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-4s8ph namespace: kube-system uid: 0f87ae31-f6df-43d6-b42a-0236e849318a result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-4s8ph namespace: kube-system uid: 0f87ae31-f6df-43d6-b42a-0236e849318a result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-4s8ph namespace: kube-system uid: 0f87ae31-f6df-43d6-b42a-0236e849318a result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-4s8ph namespace: kube-system uid: 0f87ae31-f6df-43d6-b42a-0236e849318a result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-4s8ph namespace: kube-system uid: 0f87ae31-f6df-43d6-b42a-0236e849318a result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-4s8ph namespace: kube-system uid: 0f87ae31-f6df-43d6-b42a-0236e849318a result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: dbe3c81f-b1df-4801-9788-76a8bdb5ae88 result: skip rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: dbe3c81f-b1df-4801-9788-76a8bdb5ae88 result: skip rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: dbe3c81f-b1df-4801-9788-76a8bdb5ae88 result: skip rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'autogen-validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: dbe3c81f-b1df-4801-9788-76a8bdb5ae88 result: pass rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: dbe3c81f-b1df-4801-9788-76a8bdb5ae88 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'autogen-validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: dbe3c81f-b1df-4801-9788-76a8bdb5ae88 result: pass rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: dbe3c81f-b1df-4801-9788-76a8bdb5ae88 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'autogen-validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: dbe3c81f-b1df-4801-9788-76a8bdb5ae88 result: pass rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: dbe3c81f-b1df-4801-9788-76a8bdb5ae88 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-n2gsh namespace: kube-system uid: 4a823046-cae0-4bb3-936a-64a078683298 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-n2gsh namespace: kube-system uid: 4a823046-cae0-4bb3-936a-64a078683298 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-n2gsh namespace: kube-system uid: 4a823046-cae0-4bb3-936a-64a078683298 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-n2gsh namespace: kube-system uid: 4a823046-cae0-4bb3-936a-64a078683298 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-n2gsh namespace: kube-system uid: 4a823046-cae0-4bb3-936a-64a078683298 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-n2gsh namespace: kube-system uid: 4a823046-cae0-4bb3-936a-64a078683298 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-n2gsh namespace: kube-system uid: 4a823046-cae0-4bb3-936a-64a078683298 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-n2gsh namespace: kube-system uid: 4a823046-cae0-4bb3-936a-64a078683298 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-n2gsh namespace: kube-system uid: 4a823046-cae0-4bb3-936a-64a078683298 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 6087f159-3f81-44a8-8c58-4530c3060568 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 6087f159-3f81-44a8-8c58-4530c3060568 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 6087f159-3f81-44a8-8c58-4530c3060568 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 6087f159-3f81-44a8-8c58-4530c3060568 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 6087f159-3f81-44a8-8c58-4530c3060568 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 6087f159-3f81-44a8-8c58-4530c3060568 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 6087f159-3f81-44a8-8c58-4530c3060568 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 6087f159-3f81-44a8-8c58-4530c3060568 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 6087f159-3f81-44a8-8c58-4530c3060568 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-dkr2j namespace: kube-system uid: 14b0603b-2896-496e-84e3-572ff7452828 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-dkr2j namespace: kube-system uid: 14b0603b-2896-496e-84e3-572ff7452828 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-dkr2j namespace: kube-system uid: 14b0603b-2896-496e-84e3-572ff7452828 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-dkr2j namespace: kube-system uid: 14b0603b-2896-496e-84e3-572ff7452828 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-dkr2j namespace: kube-system uid: 14b0603b-2896-496e-84e3-572ff7452828 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-dkr2j namespace: kube-system uid: 14b0603b-2896-496e-84e3-572ff7452828 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-dkr2j namespace: kube-system uid: 14b0603b-2896-496e-84e3-572ff7452828 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-dkr2j namespace: kube-system uid: 14b0603b-2896-496e-84e3-572ff7452828 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-dkr2j namespace: kube-system uid: 14b0603b-2896-496e-84e3-572ff7452828 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-5d7tp namespace: kube-system uid: 740809cc-4bf8-40e5-a556-d39f5cf1ff03 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-5d7tp namespace: kube-system uid: 740809cc-4bf8-40e5-a556-d39f5cf1ff03 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-5d7tp namespace: kube-system uid: 740809cc-4bf8-40e5-a556-d39f5cf1ff03 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-5d7tp namespace: kube-system uid: 740809cc-4bf8-40e5-a556-d39f5cf1ff03 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-5d7tp namespace: kube-system uid: 740809cc-4bf8-40e5-a556-d39f5cf1ff03 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-5d7tp namespace: kube-system uid: 740809cc-4bf8-40e5-a556-d39f5cf1ff03 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-5d7tp namespace: kube-system uid: 740809cc-4bf8-40e5-a556-d39f5cf1ff03 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-5d7tp namespace: kube-system uid: 740809cc-4bf8-40e5-a556-d39f5cf1ff03 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-5d7tp namespace: kube-system uid: 740809cc-4bf8-40e5-a556-d39f5cf1ff03 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-qnxv9 namespace: kube-system uid: b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-qnxv9 namespace: kube-system uid: b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-qnxv9 namespace: kube-system uid: b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-qnxv9 namespace: kube-system uid: b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-qnxv9 namespace: kube-system uid: b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-qnxv9 namespace: kube-system uid: b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-qnxv9 namespace: kube-system uid: b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-qnxv9 namespace: kube-system uid: b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-qnxv9 namespace: kube-system uid: b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 55badffb-46f4-4ed0-a515-3da36c21bd5a result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 55badffb-46f4-4ed0-a515-3da36c21bd5a result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 55badffb-46f4-4ed0-a515-3da36c21bd5a result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 55badffb-46f4-4ed0-a515-3da36c21bd5a result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 55badffb-46f4-4ed0-a515-3da36c21bd5a result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 55badffb-46f4-4ed0-a515-3da36c21bd5a result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 55badffb-46f4-4ed0-a515-3da36c21bd5a result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 55badffb-46f4-4ed0-a515-3da36c21bd5a result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 55badffb-46f4-4ed0-a515-3da36c21bd5a result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-k7lcp namespace: kube-system uid: 5ab0230a-25d6-4060-bc00-a54f5f07b579 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-k7lcp namespace: kube-system uid: 5ab0230a-25d6-4060-bc00-a54f5f07b579 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-k7lcp namespace: kube-system uid: 5ab0230a-25d6-4060-bc00-a54f5f07b579 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-k7lcp namespace: kube-system uid: 5ab0230a-25d6-4060-bc00-a54f5f07b579 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-k7lcp namespace: kube-system uid: 5ab0230a-25d6-4060-bc00-a54f5f07b579 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-k7lcp namespace: kube-system uid: 5ab0230a-25d6-4060-bc00-a54f5f07b579 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-k7lcp namespace: kube-system uid: 5ab0230a-25d6-4060-bc00-a54f5f07b579 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-k7lcp namespace: kube-system uid: 5ab0230a-25d6-4060-bc00-a54f5f07b579 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-k7lcp namespace: kube-system uid: 5ab0230a-25d6-4060-bc00-a54f5f07b579 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: 5b0261cd-89a1-46a4-97b3-f87aadbe4002 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: 5b0261cd-89a1-46a4-97b3-f87aadbe4002 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: 5b0261cd-89a1-46a4-97b3-f87aadbe4002 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: 5b0261cd-89a1-46a4-97b3-f87aadbe4002 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: 5b0261cd-89a1-46a4-97b3-f87aadbe4002 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: 5b0261cd-89a1-46a4-97b3-f87aadbe4002 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: 5b0261cd-89a1-46a4-97b3-f87aadbe4002 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: 5b0261cd-89a1-46a4-97b3-f87aadbe4002 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: 5b0261cd-89a1-46a4-97b3-f87aadbe4002 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3bd38cf6-1ff8-44a5-8759-66ddd18a24bf result: skip rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3bd38cf6-1ff8-44a5-8759-66ddd18a24bf result: skip rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3bd38cf6-1ff8-44a5-8759-66ddd18a24bf result: skip rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'autogen-validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3bd38cf6-1ff8-44a5-8759-66ddd18a24bf result: pass rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3bd38cf6-1ff8-44a5-8759-66ddd18a24bf result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'autogen-validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3bd38cf6-1ff8-44a5-8759-66ddd18a24bf result: pass rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3bd38cf6-1ff8-44a5-8759-66ddd18a24bf result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'autogen-validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3bd38cf6-1ff8-44a5-8759-66ddd18a24bf result: pass rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3bd38cf6-1ff8-44a5-8759-66ddd18a24bf result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-kj9qx namespace: kube-system uid: d57bb953-a274-4ab3-9e0d-ecd30b29e177 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-kj9qx namespace: kube-system uid: d57bb953-a274-4ab3-9e0d-ecd30b29e177 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-kj9qx namespace: kube-system uid: d57bb953-a274-4ab3-9e0d-ecd30b29e177 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-kj9qx namespace: kube-system uid: d57bb953-a274-4ab3-9e0d-ecd30b29e177 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-kj9qx namespace: kube-system uid: d57bb953-a274-4ab3-9e0d-ecd30b29e177 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-kj9qx namespace: kube-system uid: d57bb953-a274-4ab3-9e0d-ecd30b29e177 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-kj9qx namespace: kube-system uid: d57bb953-a274-4ab3-9e0d-ecd30b29e177 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-kj9qx namespace: kube-system uid: d57bb953-a274-4ab3-9e0d-ecd30b29e177 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kindnet-kj9qx namespace: kube-system uid: d57bb953-a274-4ab3-9e0d-ecd30b29e177 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-ssh49 namespace: kube-system uid: 59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-ssh49 namespace: kube-system uid: 59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-ssh49 namespace: kube-system uid: 59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-ssh49 namespace: kube-system uid: 59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-ssh49 namespace: kube-system uid: 59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-ssh49 namespace: kube-system uid: 59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-ssh49 namespace: kube-system uid: 59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-ssh49 namespace: kube-system uid: 59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: kube-proxy-ssh49 namespace: kube-system uid: 59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7th7s namespace: kube-system uid: e8cdf891-c99d-456e-97a1-587cd1464f6a result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7th7s namespace: kube-system uid: e8cdf891-c99d-456e-97a1-587cd1464f6a result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7th7s namespace: kube-system uid: e8cdf891-c99d-456e-97a1-587cd1464f6a result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7th7s namespace: kube-system uid: e8cdf891-c99d-456e-97a1-587cd1464f6a result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7th7s namespace: kube-system uid: e8cdf891-c99d-456e-97a1-587cd1464f6a result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7th7s namespace: kube-system uid: e8cdf891-c99d-456e-97a1-587cd1464f6a result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7th7s namespace: kube-system uid: e8cdf891-c99d-456e-97a1-587cd1464f6a result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7th7s namespace: kube-system uid: e8cdf891-c99d-456e-97a1-587cd1464f6a result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7th7s namespace: kube-system uid: e8cdf891-c99d-456e-97a1-587cd1464f6a result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-nh5jq namespace: kube-system uid: 6cb7a212-fae9-4286-a247-4fdedccaaef0 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-nh5jq namespace: kube-system uid: 6cb7a212-fae9-4286-a247-4fdedccaaef0 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-nh5jq namespace: kube-system uid: 6cb7a212-fae9-4286-a247-4fdedccaaef0 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-nh5jq namespace: kube-system uid: 6cb7a212-fae9-4286-a247-4fdedccaaef0 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-nh5jq namespace: kube-system uid: 6cb7a212-fae9-4286-a247-4fdedccaaef0 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-nh5jq namespace: kube-system uid: 6cb7a212-fae9-4286-a247-4fdedccaaef0 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-nh5jq namespace: kube-system uid: 6cb7a212-fae9-4286-a247-4fdedccaaef0 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-nh5jq namespace: kube-system uid: 6cb7a212-fae9-4286-a247-4fdedccaaef0 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-nh5jq namespace: kube-system uid: 6cb7a212-fae9-4286-a247-4fdedccaaef0 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: f81a8b42-0344-426c-9f14-f8eafd1b50fb result: skip rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: f81a8b42-0344-426c-9f14-f8eafd1b50fb result: skip rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: f81a8b42-0344-426c-9f14-f8eafd1b50fb result: skip rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'autogen-validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: f81a8b42-0344-426c-9f14-f8eafd1b50fb result: pass rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: f81a8b42-0344-426c-9f14-f8eafd1b50fb result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'autogen-validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: f81a8b42-0344-426c-9f14-f8eafd1b50fb result: pass rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: f81a8b42-0344-426c-9f14-f8eafd1b50fb result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'autogen-validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: f81a8b42-0344-426c-9f14-f8eafd1b50fb result: pass rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: f81a8b42-0344-426c-9f14-f8eafd1b50fb result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: 98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: 98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: 98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: 98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: 98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: 98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: 98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: 98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: 98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 0c9d06dd-32e7-495f-ae06-c55e4286129c result: skip rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 0c9d06dd-32e7-495f-ae06-c55e4286129c result: skip rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 0c9d06dd-32e7-495f-ae06-c55e4286129c result: skip rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'autogen-validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 0c9d06dd-32e7-495f-ae06-c55e4286129c result: pass rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 0c9d06dd-32e7-495f-ae06-c55e4286129c result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'autogen-validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 0c9d06dd-32e7-495f-ae06-c55e4286129c result: pass rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 0c9d06dd-32e7-495f-ae06-c55e4286129c result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'autogen-validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 0c9d06dd-32e7-495f-ae06-c55e4286129c result: pass rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 0c9d06dd-32e7-495f-ae06-c55e4286129c result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-q7fmz namespace: kube-system uid: 064549ca-14e3-4970-b40f-29de7cfe116f result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-q7fmz namespace: kube-system uid: 064549ca-14e3-4970-b40f-29de7cfe116f result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-q7fmz namespace: kube-system uid: 064549ca-14e3-4970-b40f-29de7cfe116f result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-q7fmz namespace: kube-system uid: 064549ca-14e3-4970-b40f-29de7cfe116f result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-q7fmz namespace: kube-system uid: 064549ca-14e3-4970-b40f-29de7cfe116f result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-q7fmz namespace: kube-system uid: 064549ca-14e3-4970-b40f-29de7cfe116f result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-q7fmz namespace: kube-system uid: 064549ca-14e3-4970-b40f-29de7cfe116f result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-q7fmz namespace: kube-system uid: 064549ca-14e3-4970-b40f-29de7cfe116f result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: create-loop-devs-q7fmz namespace: kube-system uid: 064549ca-14e3-4970-b40f-29de7cfe116f result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-m65r6 namespace: litmus uid: ee9767f8-1757-4222-a67b-92ea555912b8 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-m65r6 namespace: litmus uid: ee9767f8-1757-4222-a67b-92ea555912b8 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-m65r6 namespace: litmus uid: ee9767f8-1757-4222-a67b-92ea555912b8 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-m65r6 namespace: litmus uid: ee9767f8-1757-4222-a67b-92ea555912b8 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-m65r6 namespace: litmus uid: ee9767f8-1757-4222-a67b-92ea555912b8 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-m65r6 namespace: litmus uid: ee9767f8-1757-4222-a67b-92ea555912b8 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-m65r6 namespace: litmus uid: ee9767f8-1757-4222-a67b-92ea555912b8 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-m65r6 namespace: litmus uid: ee9767f8-1757-4222-a67b-92ea555912b8 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-m65r6 namespace: litmus uid: ee9767f8-1757-4222-a67b-92ea555912b8 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: e8f151b3-d960-455d-8972-96ef88e7df67 result: skip rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: e8f151b3-d960-455d-8972-96ef88e7df67 result: skip rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: e8f151b3-d960-455d-8972-96ef88e7df67 result: skip rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'autogen-validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: e8f151b3-d960-455d-8972-96ef88e7df67 result: pass rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: e8f151b3-d960-455d-8972-96ef88e7df67 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'autogen-validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: e8f151b3-d960-455d-8972-96ef88e7df67 result: pass rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: e8f151b3-d960-455d-8972-96ef88e7df67 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'autogen-validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: e8f151b3-d960-455d-8972-96ef88e7df67 result: pass rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: e8f151b3-d960-455d-8972-96ef88e7df67 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 76a4ac07-175e-48d4-bd2a-be80b22f00b8 result: skip rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 76a4ac07-175e-48d4-bd2a-be80b22f00b8 result: skip rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 76a4ac07-175e-48d4-bd2a-be80b22f00b8 result: skip rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'autogen-validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 76a4ac07-175e-48d4-bd2a-be80b22f00b8 result: pass rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 76a4ac07-175e-48d4-bd2a-be80b22f00b8 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'autogen-validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 76a4ac07-175e-48d4-bd2a-be80b22f00b8 result: pass rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 76a4ac07-175e-48d4-bd2a-be80b22f00b8 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'autogen-validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 76a4ac07-175e-48d4-bd2a-be80b22f00b8 result: pass rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 76a4ac07-175e-48d4-bd2a-be80b22f00b8 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-vg86b namespace: cnf-testsuite uid: c163624b-e2b0-462b-bb0a-34fe5551b1fa result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-vg86b namespace: cnf-testsuite uid: c163624b-e2b0-462b-bb0a-34fe5551b1fa result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-vg86b namespace: cnf-testsuite uid: c163624b-e2b0-462b-bb0a-34fe5551b1fa result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-vg86b namespace: cnf-testsuite uid: c163624b-e2b0-462b-bb0a-34fe5551b1fa result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-vg86b namespace: cnf-testsuite uid: c163624b-e2b0-462b-bb0a-34fe5551b1fa result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-vg86b namespace: cnf-testsuite uid: c163624b-e2b0-462b-bb0a-34fe5551b1fa result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-vg86b namespace: cnf-testsuite uid: c163624b-e2b0-462b-bb0a-34fe5551b1fa result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-vg86b namespace: cnf-testsuite uid: c163624b-e2b0-462b-bb0a-34fe5551b1fa result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-vg86b namespace: cnf-testsuite uid: c163624b-e2b0-462b-bb0a-34fe5551b1fa result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-mh426 namespace: cnf-testsuite uid: 95aa40ad-9e0e-486b-a5d0-41f9194fd651 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-mh426 namespace: cnf-testsuite uid: 95aa40ad-9e0e-486b-a5d0-41f9194fd651 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-mh426 namespace: cnf-testsuite uid: 95aa40ad-9e0e-486b-a5d0-41f9194fd651 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-mh426 namespace: cnf-testsuite uid: 95aa40ad-9e0e-486b-a5d0-41f9194fd651 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-mh426 namespace: cnf-testsuite uid: 95aa40ad-9e0e-486b-a5d0-41f9194fd651 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-mh426 namespace: cnf-testsuite uid: 95aa40ad-9e0e-486b-a5d0-41f9194fd651 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-mh426 namespace: cnf-testsuite uid: 95aa40ad-9e0e-486b-a5d0-41f9194fd651 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-mh426 namespace: cnf-testsuite uid: 95aa40ad-9e0e-486b-a5d0-41f9194fd651 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: cluster-tools-mh426 namespace: cnf-testsuite uid: 95aa40ad-9e0e-486b-a5d0-41f9194fd651 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-coredns-64fc886fd4-clwtn namespace: cnf-default uid: 1493bcca-c392-4f42-8125-d050b7590390 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-coredns-64fc886fd4-clwtn namespace: cnf-default uid: 1493bcca-c392-4f42-8125-d050b7590390 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-coredns-64fc886fd4-clwtn namespace: cnf-default uid: 1493bcca-c392-4f42-8125-d050b7590390 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-coredns-64fc886fd4-clwtn namespace: cnf-default uid: 1493bcca-c392-4f42-8125-d050b7590390 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-coredns-64fc886fd4-clwtn namespace: cnf-default uid: 1493bcca-c392-4f42-8125-d050b7590390 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-coredns-64fc886fd4-clwtn namespace: cnf-default uid: 1493bcca-c392-4f42-8125-d050b7590390 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-coredns-64fc886fd4-clwtn namespace: cnf-default uid: 1493bcca-c392-4f42-8125-d050b7590390 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-coredns-64fc886fd4-clwtn namespace: cnf-default uid: 1493bcca-c392-4f42-8125-d050b7590390 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: coredns-coredns-64fc886fd4-clwtn namespace: cnf-default uid: 1493bcca-c392-4f42-8125-d050b7590390 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 489e7e00-25be-4697-9d6f-9e9bc6689c66 result: skip rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 489e7e00-25be-4697-9d6f-9e9bc6689c66 result: skip rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 489e7e00-25be-4697-9d6f-9e9bc6689c66 result: skip rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'autogen-validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 489e7e00-25be-4697-9d6f-9e9bc6689c66 result: pass rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 489e7e00-25be-4697-9d6f-9e9bc6689c66 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'autogen-validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 489e7e00-25be-4697-9d6f-9e9bc6689c66 result: pass rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 489e7e00-25be-4697-9d6f-9e9bc6689c66 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'autogen-validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 489e7e00-25be-4697-9d6f-9e9bc6689c66 result: pass rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 489e7e00-25be-4697-9d6f-9e9bc6689c66 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 99b15287-c7c3-412d-8f1d-f5fbcb053df1 result: skip rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 99b15287-c7c3-412d-8f1d-f5fbcb053df1 result: skip rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 99b15287-c7c3-412d-8f1d-f5fbcb053df1 result: skip rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'autogen-validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 99b15287-c7c3-412d-8f1d-f5fbcb053df1 result: pass rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 99b15287-c7c3-412d-8f1d-f5fbcb053df1 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'autogen-validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 99b15287-c7c3-412d-8f1d-f5fbcb053df1 result: pass rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 99b15287-c7c3-412d-8f1d-f5fbcb053df1 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'autogen-validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 99b15287-c7c3-412d-8f1d-f5fbcb053df1 result: pass rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 99b15287-c7c3-412d-8f1d-f5fbcb053df1 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-docker-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-58cc7856b6-xpr8d namespace: local-path-storage uid: f70efa34-43ee-49b2-8d40-494399374974 result: pass rule: validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-containerd-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-58cc7856b6-xpr8d namespace: local-path-storage uid: f70efa34-43ee-49b2-8d40-494399374974 result: pass rule: validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: validation rule 'validate-crio-sock-mount' passed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-58cc7856b6-xpr8d namespace: local-path-storage uid: f70efa34-43ee-49b2-8d40-494399374974 result: pass rule: validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-58cc7856b6-xpr8d namespace: local-path-storage uid: f70efa34-43ee-49b2-8d40-494399374974 result: skip rule: autogen-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Docker Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-58cc7856b6-xpr8d namespace: local-path-storage uid: f70efa34-43ee-49b2-8d40-494399374974 result: skip rule: autogen-cronjob-validate-docker-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-58cc7856b6-xpr8d namespace: local-path-storage uid: f70efa34-43ee-49b2-8d40-494399374974 result: skip rule: autogen-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the Containerd Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-58cc7856b6-xpr8d namespace: local-path-storage uid: f70efa34-43ee-49b2-8d40-494399374974 result: skip rule: autogen-cronjob-validate-containerd-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-58cc7856b6-xpr8d namespace: local-path-storage uid: f70efa34-43ee-49b2-8d40-494399374974 result: skip rule: autogen-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 - message: Use of the CRI-O Unix socket is not allowed. policy: disallow-container-sock-mounts resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-58cc7856b6-xpr8d namespace: local-path-storage uid: f70efa34-43ee-49b2-8d40-494399374974 result: skip rule: autogen-cronjob-validate-crio-sock-mount scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262200 summary: error: 0 fail: 0 pass: 84 skip: 168 warn: 0 D, [2025-03-06 11:56:40 UTC #1422] DEBUG -- cnf-testsuite: task container_sock_mounts emoji: 🔓🔑 I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "container_sock_mounts", "emoji" => "🔓🔑", "tags" => ["security", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:56:40 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["security", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: resp: ["security", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: task_type x: security acc: I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: task_points: task: container_sock_mounts is worth: 100 points I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: cmd: /usr/local/bin/cnf-testsuite cert I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite-container_sock_mounts: task_runtime=00:00:05.778128934; start_time=2025-03-06 11:56:34 UTC; end_time:2025-03-06 11:56:40 UTC I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "container_sock_mounts", "emoji" => "🔓🔑", "tags" => ["security", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:56:40 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["security", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: resp: ["security", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: task_type x: security acc: I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: upsert_task: task: container_sock_mounts has status: passed and is awarded: 100 points. Runtime: 00:00:05.778128934 I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: task_runner args: # I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: ensure_cnf_installed? true I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: check_cnf_config args: # I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: check_cnf_config cnf: I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [selinux_options] I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite: CNF configs found: 1 D, [2025-03-06 11:56:40 UTC #1422] DEBUG -- cnf-testsuite: single_task_runner args: # "installed_cnf_files/cnf-testsuite.yml"}> I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite-selinux_options: Starting test D, [2025-03-06 11:56:40 UTC #1422] DEBUG -- cnf-testsuite-selinux_options: cnf_config: # I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite-kyverno_policy_path: command: ls /home/xtesting/.cnf-testsuite/tools/custom-kyverno-policies/check-selinux-enabled.yml I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite-kyverno_policy_path: output: /home/xtesting/.cnf-testsuite/tools/custom-kyverno-policies/check-selinux-enabled.yml I, [2025-03-06 11:56:40 UTC #1422] INFO -- cnf-testsuite-Kyverno::PolicyAudit.run: command: /home/xtesting/.cnf-testsuite/tools/kyverno apply /home/xtesting/.cnf-testsuite/tools/custom-kyverno-policies/check-selinux-enabled.yml --cluster --policy-report I, [2025-03-06 11:56:42 UTC #1422] INFO -- cnf-testsuite-Kyverno::PolicyAudit.run: output: Applying 1 policy rule to 28 resources... ---------------------------------------------------------------------- POLICY REPORT: ---------------------------------------------------------------------- apiVersion: wgpolicyk8s.io/v1alpha2 kind: ClusterPolicyReport metadata: name: clusterpolicyreport results: - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 76a4ac07-175e-48d4-bd2a-be80b22f00b8 result: skip rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: validation rule 'autogen-selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 76a4ac07-175e-48d4-bd2a-be80b22f00b8 result: pass rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 76a4ac07-175e-48d4-bd2a-be80b22f00b8 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: cluster-tools-mh426 namespace: cnf-testsuite uid: 95aa40ad-9e0e-486b-a5d0-41f9194fd651 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: cluster-tools-mh426 namespace: cnf-testsuite uid: 95aa40ad-9e0e-486b-a5d0-41f9194fd651 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: cluster-tools-mh426 namespace: cnf-testsuite uid: 95aa40ad-9e0e-486b-a5d0-41f9194fd651 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: cluster-tools-vg86b namespace: cnf-testsuite uid: c163624b-e2b0-462b-bb0a-34fe5551b1fa result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: cluster-tools-vg86b namespace: cnf-testsuite uid: c163624b-e2b0-462b-bb0a-34fe5551b1fa result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: cluster-tools-vg86b namespace: cnf-testsuite uid: c163624b-e2b0-462b-bb0a-34fe5551b1fa result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-58cc7856b6-xpr8d namespace: local-path-storage uid: f70efa34-43ee-49b2-8d40-494399374974 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-58cc7856b6-xpr8d namespace: local-path-storage uid: f70efa34-43ee-49b2-8d40-494399374974 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-58cc7856b6-xpr8d namespace: local-path-storage uid: f70efa34-43ee-49b2-8d40-494399374974 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 99b15287-c7c3-412d-8f1d-f5fbcb053df1 result: skip rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: validation rule 'autogen-selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 99b15287-c7c3-412d-8f1d-f5fbcb053df1 result: pass rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 99b15287-c7c3-412d-8f1d-f5fbcb053df1 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-m65r6 namespace: litmus uid: ee9767f8-1757-4222-a67b-92ea555912b8 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-m65r6 namespace: litmus uid: ee9767f8-1757-4222-a67b-92ea555912b8 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-m65r6 namespace: litmus uid: ee9767f8-1757-4222-a67b-92ea555912b8 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: e8f151b3-d960-455d-8972-96ef88e7df67 result: skip rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: validation rule 'autogen-selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: e8f151b3-d960-455d-8972-96ef88e7df67 result: pass rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: e8f151b3-d960-455d-8972-96ef88e7df67 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kindnet-kj9qx namespace: kube-system uid: d57bb953-a274-4ab3-9e0d-ecd30b29e177 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kindnet-kj9qx namespace: kube-system uid: d57bb953-a274-4ab3-9e0d-ecd30b29e177 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kindnet-kj9qx namespace: kube-system uid: d57bb953-a274-4ab3-9e0d-ecd30b29e177 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 55badffb-46f4-4ed0-a515-3da36c21bd5a result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 55badffb-46f4-4ed0-a515-3da36c21bd5a result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 55badffb-46f4-4ed0-a515-3da36c21bd5a result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kindnet-4s8ph namespace: kube-system uid: 0f87ae31-f6df-43d6-b42a-0236e849318a result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kindnet-4s8ph namespace: kube-system uid: 0f87ae31-f6df-43d6-b42a-0236e849318a result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kindnet-4s8ph namespace: kube-system uid: 0f87ae31-f6df-43d6-b42a-0236e849318a result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: 5b0261cd-89a1-46a4-97b3-f87aadbe4002 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: 5b0261cd-89a1-46a4-97b3-f87aadbe4002 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: 5b0261cd-89a1-46a4-97b3-f87aadbe4002 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3bd38cf6-1ff8-44a5-8759-66ddd18a24bf result: skip rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: validation rule 'autogen-selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3bd38cf6-1ff8-44a5-8759-66ddd18a24bf result: pass rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3bd38cf6-1ff8-44a5-8759-66ddd18a24bf result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-proxy-k7lcp namespace: kube-system uid: 5ab0230a-25d6-4060-bc00-a54f5f07b579 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-proxy-k7lcp namespace: kube-system uid: 5ab0230a-25d6-4060-bc00-a54f5f07b579 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-proxy-k7lcp namespace: kube-system uid: 5ab0230a-25d6-4060-bc00-a54f5f07b579 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: create-loop-devs-5d7tp namespace: kube-system uid: 740809cc-4bf8-40e5-a556-d39f5cf1ff03 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: create-loop-devs-5d7tp namespace: kube-system uid: 740809cc-4bf8-40e5-a556-d39f5cf1ff03 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: create-loop-devs-5d7tp namespace: kube-system uid: 740809cc-4bf8-40e5-a556-d39f5cf1ff03 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: create-loop-devs-q7fmz namespace: kube-system uid: 064549ca-14e3-4970-b40f-29de7cfe116f result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: create-loop-devs-q7fmz namespace: kube-system uid: 064549ca-14e3-4970-b40f-29de7cfe116f result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: create-loop-devs-q7fmz namespace: kube-system uid: 064549ca-14e3-4970-b40f-29de7cfe116f result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-nh5jq namespace: kube-system uid: 6cb7a212-fae9-4286-a247-4fdedccaaef0 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-nh5jq namespace: kube-system uid: 6cb7a212-fae9-4286-a247-4fdedccaaef0 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-nh5jq namespace: kube-system uid: 6cb7a212-fae9-4286-a247-4fdedccaaef0 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7th7s namespace: kube-system uid: e8cdf891-c99d-456e-97a1-587cd1464f6a result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7th7s namespace: kube-system uid: e8cdf891-c99d-456e-97a1-587cd1464f6a result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7th7s namespace: kube-system uid: e8cdf891-c99d-456e-97a1-587cd1464f6a result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-proxy-dkr2j namespace: kube-system uid: 14b0603b-2896-496e-84e3-572ff7452828 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-proxy-dkr2j namespace: kube-system uid: 14b0603b-2896-496e-84e3-572ff7452828 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-proxy-dkr2j namespace: kube-system uid: 14b0603b-2896-496e-84e3-572ff7452828 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: f81a8b42-0344-426c-9f14-f8eafd1b50fb result: skip rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: validation rule 'autogen-selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: f81a8b42-0344-426c-9f14-f8eafd1b50fb result: pass rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: f81a8b42-0344-426c-9f14-f8eafd1b50fb result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: create-loop-devs-qnxv9 namespace: kube-system uid: b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: create-loop-devs-qnxv9 namespace: kube-system uid: b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: create-loop-devs-qnxv9 namespace: kube-system uid: b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: 98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: 98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: 98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kindnet-n2gsh namespace: kube-system uid: 4a823046-cae0-4bb3-936a-64a078683298 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kindnet-n2gsh namespace: kube-system uid: 4a823046-cae0-4bb3-936a-64a078683298 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kindnet-n2gsh namespace: kube-system uid: 4a823046-cae0-4bb3-936a-64a078683298 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 6087f159-3f81-44a8-8c58-4530c3060568 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 6087f159-3f81-44a8-8c58-4530c3060568 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 6087f159-3f81-44a8-8c58-4530c3060568 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-proxy-ssh49 namespace: kube-system uid: 59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-proxy-ssh49 namespace: kube-system uid: 59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: kube-proxy-ssh49 namespace: kube-system uid: 59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 0c9d06dd-32e7-495f-ae06-c55e4286129c result: skip rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: validation rule 'autogen-selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 0c9d06dd-32e7-495f-ae06-c55e4286129c result: pass rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 0c9d06dd-32e7-495f-ae06-c55e4286129c result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: dbe3c81f-b1df-4801-9788-76a8bdb5ae88 result: skip rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: validation rule 'autogen-selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: dbe3c81f-b1df-4801-9788-76a8bdb5ae88 result: pass rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: dbe3c81f-b1df-4801-9788-76a8bdb5ae88 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 489e7e00-25be-4697-9d6f-9e9bc6689c66 result: skip rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: validation rule 'autogen-selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 489e7e00-25be-4697-9d6f-9e9bc6689c66 result: pass rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 489e7e00-25be-4697-9d6f-9e9bc6689c66 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: validation rule 'selinux-option' passed. policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: coredns-coredns-64fc886fd4-clwtn namespace: cnf-default uid: 1493bcca-c392-4f42-8125-d050b7590390 result: pass rule: selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: coredns-coredns-64fc886fd4-clwtn namespace: cnf-default uid: 1493bcca-c392-4f42-8125-d050b7590390 result: skip rule: autogen-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 - message: SELinux is enabled policy: check-selinux-enablement resources: - apiVersion: v1 kind: Pod name: coredns-coredns-64fc886fd4-clwtn namespace: cnf-default uid: 1493bcca-c392-4f42-8125-d050b7590390 result: skip rule: autogen-cronjob-selinux-option scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262202 summary: error: 0 fail: 0 pass: 28 skip: 56 warn: 0 I, [2025-03-06 11:56:42 UTC #1422] INFO -- cnf-testsuite-kyverno_policy_path: command: ls /home/xtesting/.cnf-testsuite/tools/kyverno-policies/pod-security/baseline/disallow-selinux/disallow-selinux.yaml I, [2025-03-06 11:56:42 UTC #1422] INFO -- cnf-testsuite-kyverno_policy_path: output: /home/xtesting/.cnf-testsuite/tools/kyverno-policies/pod-security/baseline/disallow-selinux/disallow-selinux.yaml I, [2025-03-06 11:56:42 UTC #1422] INFO -- cnf-testsuite-Kyverno::PolicyAudit.run: command: /home/xtesting/.cnf-testsuite/tools/kyverno apply /home/xtesting/.cnf-testsuite/tools/kyverno-policies/pod-security/baseline/disallow-selinux/disallow-selinux.yaml --cluster --policy-report ⏭️ 🏆N/A: [selinux_options] Pods are not using SELinux 🔓🔑 I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite-Kyverno::PolicyAudit.run: output: Applying 2 policy rules to 28 resources... ---------------------------------------------------------------------- POLICY REPORT: ---------------------------------------------------------------------- apiVersion: wgpolicyk8s.io/v1alpha2 kind: ClusterPolicyReport metadata: name: clusterpolicyreport results: - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-58cc7856b6-xpr8d namespace: local-path-storage uid: f70efa34-43ee-49b2-8d40-494399374974 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-58cc7856b6-xpr8d namespace: local-path-storage uid: f70efa34-43ee-49b2-8d40-494399374974 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-58cc7856b6-xpr8d namespace: local-path-storage uid: f70efa34-43ee-49b2-8d40-494399374974 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-58cc7856b6-xpr8d namespace: local-path-storage uid: f70efa34-43ee-49b2-8d40-494399374974 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-58cc7856b6-xpr8d namespace: local-path-storage uid: f70efa34-43ee-49b2-8d40-494399374974 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-58cc7856b6-xpr8d namespace: local-path-storage uid: f70efa34-43ee-49b2-8d40-494399374974 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 99b15287-c7c3-412d-8f1d-f5fbcb053df1 result: skip rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 99b15287-c7c3-412d-8f1d-f5fbcb053df1 result: skip rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'autogen-selinux-type' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 99b15287-c7c3-412d-8f1d-f5fbcb053df1 result: pass rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 99b15287-c7c3-412d-8f1d-f5fbcb053df1 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'autogen-selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 99b15287-c7c3-412d-8f1d-f5fbcb053df1 result: pass rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 99b15287-c7c3-412d-8f1d-f5fbcb053df1 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-coredns-64fc886fd4-clwtn namespace: cnf-default uid: 1493bcca-c392-4f42-8125-d050b7590390 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-coredns-64fc886fd4-clwtn namespace: cnf-default uid: 1493bcca-c392-4f42-8125-d050b7590390 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-coredns-64fc886fd4-clwtn namespace: cnf-default uid: 1493bcca-c392-4f42-8125-d050b7590390 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-coredns-64fc886fd4-clwtn namespace: cnf-default uid: 1493bcca-c392-4f42-8125-d050b7590390 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-coredns-64fc886fd4-clwtn namespace: cnf-default uid: 1493bcca-c392-4f42-8125-d050b7590390 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-coredns-64fc886fd4-clwtn namespace: cnf-default uid: 1493bcca-c392-4f42-8125-d050b7590390 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 489e7e00-25be-4697-9d6f-9e9bc6689c66 result: skip rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 489e7e00-25be-4697-9d6f-9e9bc6689c66 result: skip rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'autogen-selinux-type' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 489e7e00-25be-4697-9d6f-9e9bc6689c66 result: pass rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 489e7e00-25be-4697-9d6f-9e9bc6689c66 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'autogen-selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 489e7e00-25be-4697-9d6f-9e9bc6689c66 result: pass rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 489e7e00-25be-4697-9d6f-9e9bc6689c66 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 76a4ac07-175e-48d4-bd2a-be80b22f00b8 result: skip rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 76a4ac07-175e-48d4-bd2a-be80b22f00b8 result: skip rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'autogen-selinux-type' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 76a4ac07-175e-48d4-bd2a-be80b22f00b8 result: pass rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 76a4ac07-175e-48d4-bd2a-be80b22f00b8 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'autogen-selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 76a4ac07-175e-48d4-bd2a-be80b22f00b8 result: pass rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 76a4ac07-175e-48d4-bd2a-be80b22f00b8 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-mh426 namespace: cnf-testsuite uid: 95aa40ad-9e0e-486b-a5d0-41f9194fd651 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-mh426 namespace: cnf-testsuite uid: 95aa40ad-9e0e-486b-a5d0-41f9194fd651 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-mh426 namespace: cnf-testsuite uid: 95aa40ad-9e0e-486b-a5d0-41f9194fd651 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-mh426 namespace: cnf-testsuite uid: 95aa40ad-9e0e-486b-a5d0-41f9194fd651 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-mh426 namespace: cnf-testsuite uid: 95aa40ad-9e0e-486b-a5d0-41f9194fd651 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-mh426 namespace: cnf-testsuite uid: 95aa40ad-9e0e-486b-a5d0-41f9194fd651 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-vg86b namespace: cnf-testsuite uid: c163624b-e2b0-462b-bb0a-34fe5551b1fa result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-vg86b namespace: cnf-testsuite uid: c163624b-e2b0-462b-bb0a-34fe5551b1fa result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-vg86b namespace: cnf-testsuite uid: c163624b-e2b0-462b-bb0a-34fe5551b1fa result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-vg86b namespace: cnf-testsuite uid: c163624b-e2b0-462b-bb0a-34fe5551b1fa result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-vg86b namespace: cnf-testsuite uid: c163624b-e2b0-462b-bb0a-34fe5551b1fa result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: cluster-tools-vg86b namespace: cnf-testsuite uid: c163624b-e2b0-462b-bb0a-34fe5551b1fa result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-5d7tp namespace: kube-system uid: 740809cc-4bf8-40e5-a556-d39f5cf1ff03 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-5d7tp namespace: kube-system uid: 740809cc-4bf8-40e5-a556-d39f5cf1ff03 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-5d7tp namespace: kube-system uid: 740809cc-4bf8-40e5-a556-d39f5cf1ff03 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-5d7tp namespace: kube-system uid: 740809cc-4bf8-40e5-a556-d39f5cf1ff03 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-5d7tp namespace: kube-system uid: 740809cc-4bf8-40e5-a556-d39f5cf1ff03 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-5d7tp namespace: kube-system uid: 740809cc-4bf8-40e5-a556-d39f5cf1ff03 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-4s8ph namespace: kube-system uid: 0f87ae31-f6df-43d6-b42a-0236e849318a result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-4s8ph namespace: kube-system uid: 0f87ae31-f6df-43d6-b42a-0236e849318a result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-4s8ph namespace: kube-system uid: 0f87ae31-f6df-43d6-b42a-0236e849318a result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-4s8ph namespace: kube-system uid: 0f87ae31-f6df-43d6-b42a-0236e849318a result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-4s8ph namespace: kube-system uid: 0f87ae31-f6df-43d6-b42a-0236e849318a result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-4s8ph namespace: kube-system uid: 0f87ae31-f6df-43d6-b42a-0236e849318a result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7th7s namespace: kube-system uid: e8cdf891-c99d-456e-97a1-587cd1464f6a result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7th7s namespace: kube-system uid: e8cdf891-c99d-456e-97a1-587cd1464f6a result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7th7s namespace: kube-system uid: e8cdf891-c99d-456e-97a1-587cd1464f6a result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7th7s namespace: kube-system uid: e8cdf891-c99d-456e-97a1-587cd1464f6a result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7th7s namespace: kube-system uid: e8cdf891-c99d-456e-97a1-587cd1464f6a result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7th7s namespace: kube-system uid: e8cdf891-c99d-456e-97a1-587cd1464f6a result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-kj9qx namespace: kube-system uid: d57bb953-a274-4ab3-9e0d-ecd30b29e177 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-kj9qx namespace: kube-system uid: d57bb953-a274-4ab3-9e0d-ecd30b29e177 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-kj9qx namespace: kube-system uid: d57bb953-a274-4ab3-9e0d-ecd30b29e177 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-kj9qx namespace: kube-system uid: d57bb953-a274-4ab3-9e0d-ecd30b29e177 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-kj9qx namespace: kube-system uid: d57bb953-a274-4ab3-9e0d-ecd30b29e177 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-kj9qx namespace: kube-system uid: d57bb953-a274-4ab3-9e0d-ecd30b29e177 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-ssh49 namespace: kube-system uid: 59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-ssh49 namespace: kube-system uid: 59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-ssh49 namespace: kube-system uid: 59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-ssh49 namespace: kube-system uid: 59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-ssh49 namespace: kube-system uid: 59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-ssh49 namespace: kube-system uid: 59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: dbe3c81f-b1df-4801-9788-76a8bdb5ae88 result: skip rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: dbe3c81f-b1df-4801-9788-76a8bdb5ae88 result: skip rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'autogen-selinux-type' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: dbe3c81f-b1df-4801-9788-76a8bdb5ae88 result: pass rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: dbe3c81f-b1df-4801-9788-76a8bdb5ae88 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'autogen-selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: dbe3c81f-b1df-4801-9788-76a8bdb5ae88 result: pass rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: dbe3c81f-b1df-4801-9788-76a8bdb5ae88 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3bd38cf6-1ff8-44a5-8759-66ddd18a24bf result: skip rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3bd38cf6-1ff8-44a5-8759-66ddd18a24bf result: skip rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'autogen-selinux-type' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3bd38cf6-1ff8-44a5-8759-66ddd18a24bf result: pass rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3bd38cf6-1ff8-44a5-8759-66ddd18a24bf result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'autogen-selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3bd38cf6-1ff8-44a5-8759-66ddd18a24bf result: pass rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3bd38cf6-1ff8-44a5-8759-66ddd18a24bf result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-n2gsh namespace: kube-system uid: 4a823046-cae0-4bb3-936a-64a078683298 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-n2gsh namespace: kube-system uid: 4a823046-cae0-4bb3-936a-64a078683298 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-n2gsh namespace: kube-system uid: 4a823046-cae0-4bb3-936a-64a078683298 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-n2gsh namespace: kube-system uid: 4a823046-cae0-4bb3-936a-64a078683298 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-n2gsh namespace: kube-system uid: 4a823046-cae0-4bb3-936a-64a078683298 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kindnet-n2gsh namespace: kube-system uid: 4a823046-cae0-4bb3-936a-64a078683298 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 6087f159-3f81-44a8-8c58-4530c3060568 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 6087f159-3f81-44a8-8c58-4530c3060568 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 6087f159-3f81-44a8-8c58-4530c3060568 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 6087f159-3f81-44a8-8c58-4530c3060568 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 6087f159-3f81-44a8-8c58-4530c3060568 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 6087f159-3f81-44a8-8c58-4530c3060568 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: f81a8b42-0344-426c-9f14-f8eafd1b50fb result: skip rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: f81a8b42-0344-426c-9f14-f8eafd1b50fb result: skip rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'autogen-selinux-type' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: f81a8b42-0344-426c-9f14-f8eafd1b50fb result: pass rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: f81a8b42-0344-426c-9f14-f8eafd1b50fb result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'autogen-selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: f81a8b42-0344-426c-9f14-f8eafd1b50fb result: pass rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: f81a8b42-0344-426c-9f14-f8eafd1b50fb result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-dkr2j namespace: kube-system uid: 14b0603b-2896-496e-84e3-572ff7452828 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-dkr2j namespace: kube-system uid: 14b0603b-2896-496e-84e3-572ff7452828 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-dkr2j namespace: kube-system uid: 14b0603b-2896-496e-84e3-572ff7452828 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-dkr2j namespace: kube-system uid: 14b0603b-2896-496e-84e3-572ff7452828 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-dkr2j namespace: kube-system uid: 14b0603b-2896-496e-84e3-572ff7452828 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-dkr2j namespace: kube-system uid: 14b0603b-2896-496e-84e3-572ff7452828 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 0c9d06dd-32e7-495f-ae06-c55e4286129c result: skip rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 0c9d06dd-32e7-495f-ae06-c55e4286129c result: skip rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'autogen-selinux-type' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 0c9d06dd-32e7-495f-ae06-c55e4286129c result: pass rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 0c9d06dd-32e7-495f-ae06-c55e4286129c result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'autogen-selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 0c9d06dd-32e7-495f-ae06-c55e4286129c result: pass rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 0c9d06dd-32e7-495f-ae06-c55e4286129c result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-q7fmz namespace: kube-system uid: 064549ca-14e3-4970-b40f-29de7cfe116f result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-q7fmz namespace: kube-system uid: 064549ca-14e3-4970-b40f-29de7cfe116f result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-q7fmz namespace: kube-system uid: 064549ca-14e3-4970-b40f-29de7cfe116f result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-q7fmz namespace: kube-system uid: 064549ca-14e3-4970-b40f-29de7cfe116f result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-q7fmz namespace: kube-system uid: 064549ca-14e3-4970-b40f-29de7cfe116f result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-q7fmz namespace: kube-system uid: 064549ca-14e3-4970-b40f-29de7cfe116f result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-k7lcp namespace: kube-system uid: 5ab0230a-25d6-4060-bc00-a54f5f07b579 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-k7lcp namespace: kube-system uid: 5ab0230a-25d6-4060-bc00-a54f5f07b579 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-k7lcp namespace: kube-system uid: 5ab0230a-25d6-4060-bc00-a54f5f07b579 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-k7lcp namespace: kube-system uid: 5ab0230a-25d6-4060-bc00-a54f5f07b579 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-k7lcp namespace: kube-system uid: 5ab0230a-25d6-4060-bc00-a54f5f07b579 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-proxy-k7lcp namespace: kube-system uid: 5ab0230a-25d6-4060-bc00-a54f5f07b579 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: 5b0261cd-89a1-46a4-97b3-f87aadbe4002 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: 5b0261cd-89a1-46a4-97b3-f87aadbe4002 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: 5b0261cd-89a1-46a4-97b3-f87aadbe4002 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: 5b0261cd-89a1-46a4-97b3-f87aadbe4002 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: 5b0261cd-89a1-46a4-97b3-f87aadbe4002 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: 5b0261cd-89a1-46a4-97b3-f87aadbe4002 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-qnxv9 namespace: kube-system uid: b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-qnxv9 namespace: kube-system uid: b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-qnxv9 namespace: kube-system uid: b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-qnxv9 namespace: kube-system uid: b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-qnxv9 namespace: kube-system uid: b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: create-loop-devs-qnxv9 namespace: kube-system uid: b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: 98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: 98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: 98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: 98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: 98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: 98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 55badffb-46f4-4ed0-a515-3da36c21bd5a result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 55badffb-46f4-4ed0-a515-3da36c21bd5a result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 55badffb-46f4-4ed0-a515-3da36c21bd5a result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 55badffb-46f4-4ed0-a515-3da36c21bd5a result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 55badffb-46f4-4ed0-a515-3da36c21bd5a result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 55badffb-46f4-4ed0-a515-3da36c21bd5a result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-nh5jq namespace: kube-system uid: 6cb7a212-fae9-4286-a247-4fdedccaaef0 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-nh5jq namespace: kube-system uid: 6cb7a212-fae9-4286-a247-4fdedccaaef0 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-nh5jq namespace: kube-system uid: 6cb7a212-fae9-4286-a247-4fdedccaaef0 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-nh5jq namespace: kube-system uid: 6cb7a212-fae9-4286-a247-4fdedccaaef0 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-nh5jq namespace: kube-system uid: 6cb7a212-fae9-4286-a247-4fdedccaaef0 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-nh5jq namespace: kube-system uid: 6cb7a212-fae9-4286-a247-4fdedccaaef0 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-type' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-m65r6 namespace: litmus uid: ee9767f8-1757-4222-a67b-92ea555912b8 result: pass rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-m65r6 namespace: litmus uid: ee9767f8-1757-4222-a67b-92ea555912b8 result: pass rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-m65r6 namespace: litmus uid: ee9767f8-1757-4222-a67b-92ea555912b8 result: skip rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-m65r6 namespace: litmus uid: ee9767f8-1757-4222-a67b-92ea555912b8 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-m65r6 namespace: litmus uid: ee9767f8-1757-4222-a67b-92ea555912b8 result: skip rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-m65r6 namespace: litmus uid: ee9767f8-1757-4222-a67b-92ea555912b8 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: e8f151b3-d960-455d-8972-96ef88e7df67 result: skip rule: selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: e8f151b3-d960-455d-8972-96ef88e7df67 result: skip rule: selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'autogen-selinux-type' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: e8f151b3-d960-455d-8972-96ef88e7df67 result: pass rule: autogen-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux type is restricted. The fields spec.securityContext.seLinuxOptions.type, spec.containers[*].securityContext.seLinuxOptions.type, , spec.initContainers[*].securityContext.seLinuxOptions, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.type must either be unset or set to one of the allowed values (container_t, container_init_t, or container_kvm_t). policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: e8f151b3-d960-455d-8972-96ef88e7df67 result: skip rule: autogen-cronjob-selinux-type scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: validation rule 'autogen-selinux-user-role' passed. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: e8f151b3-d960-455d-8972-96ef88e7df67 result: pass rule: autogen-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 - message: Setting the SELinux user or role is forbidden. The fields spec.securityContext.seLinuxOptions.user, spec.securityContext.seLinuxOptions.role, spec.containers[*].securityContext.seLinuxOptions.user, spec.containers[*].securityContext.seLinuxOptions.role, spec.initContainers[*].securityContext.seLinuxOptions.user, spec.initContainers[*].securityContext.seLinuxOptions.role, spec.ephemeralContainers[*].securityContext.seLinuxOptions.user, and spec.ephemeralContainers[*].securityContext.seLinuxOptions.role must be unset. policy: disallow-selinux resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: e8f151b3-d960-455d-8972-96ef88e7df67 result: skip rule: autogen-cronjob-selinux-user-role scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262204 summary: error: 0 fail: 0 pass: 56 skip: 112 warn: 0 I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: cnf_resource_ymls I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: manifest_path_to_ymls file_path: installed_cnf_files/common_manifest.yml I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: manifest_string_to_ymls D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: manifest_string_to_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: cnf_resource_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Deployment D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"} D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Service D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"} D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: {} D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Pod D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ReplicaSet D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: StatefulSet D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: DaemonSet D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ServiceAccount D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: resources: [] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: all resource: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: cnf-default,deployment/coredns-coredns D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: cnf-default,service/coredns-coredns D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: task selinux_options emoji: 🔓🔑 I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "selinux_options", "emoji" => "🔓🔑", "tags" => ["security", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["security", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: resp: ["security", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task_type x: security acc: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task_points: task: selinux_options is worth: 0 points I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: cmd: /usr/local/bin/cnf-testsuite cert I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite-selinux_options: task_runtime=00:00:04.547819507; start_time=2025-03-06 11:56:40 UTC; end_time:2025-03-06 11:56:44 UTC I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "selinux_options", "emoji" => "🔓🔑", "tags" => ["security", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["security", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: resp: ["security", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task_type x: security acc: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: upsert_task: task: selinux_options has status: na and is awarded: 0 points. Runtime: 00:00:04.547819507 D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name privilege_escalation D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name symlink_file_system D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name application_credentials D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name host_network D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name service_account_mapping D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name privileged_containers D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name non_root_containers D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name host_pid_ipc_privileges D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name linux_hardening D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name cpu_limits D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name memory_limits D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name immutable_file_systems D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name hostpath_mounts D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name ingress_egress_blocked D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name insecure_capabilities D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name sysctls D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name container_sock_mounts D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name external_ips D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name selinux_options D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["security", "cert"], found tasks: ["privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "container_sock_mounts", "selinux_options"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["security", "cert"], increase_decrease_capacity = 100 D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["security", "cert"], node_drain = 100 D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["security", "cert"], privileged_containers = 100 D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["security", "cert"], non_root_containers = 0 D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["security", "cert"], cpu_limits = 100 D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["security", "cert"], memory_limits = 100 D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["security", "cert"], hostpath_mounts = 100 D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["security", "cert"], container_sock_mounts = 100 D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["security", "cert"], selinux_options = 0 I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: total_points: ["security", "cert"] = 500 D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_max_points tag: ["security", "cert"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name privilege_escalation D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name symlink_file_system D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name application_credentials D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name host_network D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name service_account_mapping D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name privileged_containers D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name non_root_containers D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name host_pid_ipc_privileges D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name linux_hardening D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name cpu_limits D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name memory_limits D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name immutable_file_systems D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name hostpath_mounts D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name ingress_egress_blocked D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name insecure_capabilities D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name sysctls D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name container_sock_mounts D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name external_ips D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name selinux_options D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks - bonus tasks: 7 I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: skipped tests [] I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: failed tests ["non_root_containers"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name service_discovery D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_latency D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_corruption D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_duplication D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_io_stress D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name operator_installed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name secrets_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_configmap D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name no_local_volume_configuration D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name elastic_volumes D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name linux_hardening D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_file_systems D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name ingress_egress_blocked D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name prometheus_traffic D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name open_metrics D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name routed_logs D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name tracing D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: bonus tasks ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task reduce x: privileged_containers I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, node_drain = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, memory_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, selinux_options = 0 status = na I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, node_drain = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, memory_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, selinux_options = 0 status = na I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task_points: task: privileged_containers is worth: 100 points I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task reduce x: non_root_containers I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) true D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, node_drain = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, memory_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, selinux_options = 0 status = na I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, node_drain = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, memory_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, selinux_options = 0 status = na I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task_points: task: non_root_containers is worth: 100 points I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task reduce x: cpu_limits I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, node_drain = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, memory_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, selinux_options = 0 status = na I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, node_drain = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, memory_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, selinux_options = 0 status = na I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task_points: task: cpu_limits is worth: 100 points I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task reduce x: memory_limits I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, node_drain = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, memory_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, selinux_options = 0 status = na I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, node_drain = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, memory_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, selinux_options = 0 status = na I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task_points: task: memory_limits is worth: 100 points I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task reduce x: hostpath_mounts I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, node_drain = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, selinux_options = 0 status = na I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, node_drain = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, selinux_options = 0 status = na I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task_points: task: hostpath_mounts is worth: 100 points I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task reduce x: container_sock_mounts I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, node_drain = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, selinux_options = 0 status = na I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, node_drain = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, selinux_options = 0 status = na I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task_points: task: container_sock_mounts is worth: 100 points I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task reduce x: selinux_options I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, node_drain = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, privileged_containers = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, non_root_containers = 0 status = failed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, cpu_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, memory_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, selinux_options = 0 status = na I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: assigned: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, node_drain = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, privileged_containers = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, non_root_containers = 0 status = failed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, cpu_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, memory_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, selinux_options = 0 status = na I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: assigned: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: na_assigned for selinux_options I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: total_max_points: ["security", "cert"] = 600 D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_passed: ["security", "cert"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name privilege_escalation D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name symlink_file_system D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name application_credentials D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name host_network D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name service_account_mapping D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name privileged_containers D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name non_root_containers D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name host_pid_ipc_privileges D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name linux_hardening D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name cpu_limits D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name memory_limits D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name immutable_file_systems D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name hostpath_mounts D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name ingress_egress_blocked D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name insecure_capabilities D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name sysctls D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name container_sock_mounts D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name external_ips D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name selinux_options D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["security", "cert"], found tasks: ["privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "container_sock_mounts", "selinux_options"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["security", "cert"], increase_decrease_capacity = 100 D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["security", "cert"], node_drain = 100 D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["security", "cert"], privileged_containers = 100 D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["security", "cert"], non_root_containers = 0 D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["security", "cert"], cpu_limits = 100 D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["security", "cert"], memory_limits = 100 D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["security", "cert"], hostpath_mounts = 100 D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["security", "cert"], container_sock_mounts = 100 D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["security", "cert"], selinux_options = 0 I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: total_passed: ["security", "cert"] = 5 D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_max_passed tag: ["security", "cert"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name privilege_escalation D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name symlink_file_system D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name application_credentials D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name host_network D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name service_account_mapping D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name privileged_containers D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name non_root_containers D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name host_pid_ipc_privileges D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name linux_hardening D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name cpu_limits D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name memory_limits D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name immutable_file_systems D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name hostpath_mounts D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name ingress_egress_blocked D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name insecure_capabilities D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name sysctls D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name container_sock_mounts D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name external_ips D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["security"] name selinux_options D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:security, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: security D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: total_max_passed tasks: ["privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "container_sock_mounts", "selinux_options"] I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: failed I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: na I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: failed tests ["non_root_containers"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name service_discovery D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_latency D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_corruption D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_duplication D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_io_stress D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name operator_installed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name secrets_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_configmap D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name no_local_volume_configuration D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name elastic_volumes D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name linux_hardening D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_file_systems D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name ingress_egress_blocked D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name prometheus_traffic D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name open_metrics D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name routed_logs D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name tracing D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: bonus tasks ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, node_drain = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, memory_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, selinux_options = 0 status = na I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: tasks x: privileged_containers D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, node_drain = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, memory_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, selinux_options = 0 status = na I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task_points: task: privileged_containers is worth: 100 points I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) true D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, node_drain = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, memory_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, selinux_options = 0 status = na I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: tasks x: non_root_containers D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, node_drain = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, memory_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, selinux_options = 0 status = na I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task_points: task: non_root_containers is worth: 100 points I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, node_drain = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, memory_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, selinux_options = 0 status = na I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: tasks x: cpu_limits D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, node_drain = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, memory_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, selinux_options = 0 status = na I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task_points: task: cpu_limits is worth: 100 points I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, node_drain = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, memory_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, selinux_options = 0 status = na I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: tasks x: memory_limits D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, node_drain = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, memory_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, selinux_options = 0 status = na I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task_points: task: memory_limits is worth: 100 points I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, node_drain = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, selinux_options = 0 status = na I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: tasks x: hostpath_mounts D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, node_drain = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, selinux_options = 0 status = na I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task_points: task: hostpath_mounts is worth: 100 points I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, node_drain = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, selinux_options = 0 status = na I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: tasks x: container_sock_mounts D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, node_drain = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, selinux_options = 0 status = na I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: task_points: task: container_sock_mounts is worth: 100 points I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, node_drain = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, privileged_containers = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, non_root_containers = 0 status = failed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, cpu_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, memory_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, selinux_options = 0 status = na I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: assigned: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: tasks x: selinux_options D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, node_drain = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, privileged_containers = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, non_root_containers = 0 status = failed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, cpu_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, memory_limits = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, selinux_options = 0 status = na I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: assigned: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: na_assigned for selinux_options I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: total_max_passed: ["security", "cert"] = 6 D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_passed: ["essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name specialized_init_system D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name single_process_type D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name zombie_handled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name sig_term_handled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name increase_decrease_capacity D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name liveness D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name readiness D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostport_not_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name node_drain D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name privileged_containers D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name non_root_containers D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name cpu_limits D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name memory_limits D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostpath_mounts D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name log_output D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name container_sock_mounts D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name selinux_options D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name latest_tag D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], increase_decrease_capacity = 100 D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], node_drain = 100 D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], privileged_containers = 100 D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], non_root_containers = 0 D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], cpu_limits = 100 D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], memory_limits = 100 D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], hostpath_mounts = 100 D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], container_sock_mounts = 100 D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], selinux_options = 0 I, [2025-03-06 11:56:44 UTC #1422] INFO -- cnf-testsuite: total_passed: ["essential"] = 7 D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: total_max_passed tag: ["essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name specialized_init_system D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name single_process_type D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name zombie_handled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name sig_term_handled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name increase_decrease_capacity D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name liveness D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name readiness D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostport_not_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name node_drain D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name privileged_containers D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name non_root_containers D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name cpu_limits D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name memory_limits D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostpath_mounts D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name log_output D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:44 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential Security results: 5 of 6 tests passed  Configuration Tests D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name container_sock_mounts D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name selinux_options D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name latest_tag D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: total_max_passed tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: failed I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: failed tests ["non_root_containers"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name service_discovery D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_latency D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_corruption D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_duplication D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_io_stress D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name operator_installed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name secrets_used D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_configmap D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name no_local_volume_configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name elastic_volumes D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name linux_hardening D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_file_systems D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name ingress_egress_blocked D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name prometheus_traffic D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name open_metrics D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name routed_logs D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name tracing D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: bonus tasks ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: tasks x: specialized_init_system D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_points: task: specialized_init_system is worth: 100 points I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: tasks x: single_process_type D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_points: task: single_process_type is worth: 100 points I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: tasks x: zombie_handled D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_points: task: zombie_handled is worth: 100 points I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: tasks x: sig_term_handled D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_points: task: sig_term_handled is worth: 100 points I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: tasks x: increase_decrease_capacity D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_points: task: increase_decrease_capacity is worth: 100 points I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: tasks x: liveness D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_points: task: liveness is worth: 100 points I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: tasks x: readiness D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_points: task: readiness is worth: 100 points I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: tasks x: hostport_not_used D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_points: task: hostport_not_used is worth: 100 points I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: tasks x: hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_points: task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: tasks x: node_drain D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_points: task: node_drain is worth: 100 points I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: tasks x: privileged_containers D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_points: task: privileged_containers is worth: 100 points I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) true D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: tasks x: non_root_containers D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_points: task: non_root_containers is worth: 100 points I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: tasks x: cpu_limits D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_points: task: cpu_limits is worth: 100 points I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: tasks x: memory_limits D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_points: task: memory_limits is worth: 100 points I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: tasks x: hostpath_mounts D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_points: task: hostpath_mounts is worth: 100 points I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: tasks x: log_output D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_points: task: log_output is worth: 100 points I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: tasks x: container_sock_mounts D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_points: task: container_sock_mounts is worth: 100 points I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: tasks x: selinux_options D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: na_assigned for selinux_options I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: tasks x: latest_tag D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, node_drain = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, privileged_containers = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, non_root_containers = 0 status = failed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, cpu_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, memory_limits = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, selinux_options = 0 status = na I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_points: task: latest_tag is worth: 100 points I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: total_max_passed: ["essential"] = 18 D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 100, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}]} D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 500, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}]} D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 500, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}]} D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 500, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}], "maximum_points" => 600} D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name versioned_tag D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name ip_addresses D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name operator_installed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name nodeport_not_used D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name hostport_not_used D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name secrets_used D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name immutable_configmap D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name alpha_k8s_apis D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name require_labels D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name default_namespace D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name latest_tag D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_runner args: # I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: ensure_cnf_installed? true I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: check_cnf_config args: # I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: check_cnf_config cnf: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [hostport_not_used] I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: CNF configs found: 1 D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: single_task_runner args: # "installed_cnf_files/cnf-testsuite.yml"}> I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite-hostport_not_used: Starting test D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite-hostport_not_used: cnf_config: # I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: cnf_resource_ymls I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: manifest_path_to_ymls file_path: installed_cnf_files/common_manifest.yml I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: manifest_string_to_ymls D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: manifest_string_to_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: cnf_resource_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Deployment D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"} D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Service D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"} D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: {} D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Pod D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ReplicaSet D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: StatefulSet D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: DaemonSet D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ServiceAccount D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: resources: [] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: all resource: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}} D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}} D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite-KubectlClient::Get.resource_volumes: Deployment resource_name: coredns-coredns namespace: cnf-default I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "litmuschaos.io/chaos": "true", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 4, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4961737", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "availableReplicas": 1, "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 4, "readyReplicas": 1, "replicas": 1, "updatedReplicas": 1 } } I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: kubectl get resource volumes: [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: kubectl get resource containers kind: Deployment resource_name: coredns-coredns namespace: cnf-default I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "litmuschaos.io/chaos": "true", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 4, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4961737", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "availableReplicas": 1, "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 4, "readyReplicas": 1, "replicas": 1, "updatedReplicas": 1 } } D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: kubectl get resource containers: [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}]}] I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite-hostport_not_used: hostport_not_used resource: {kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"} I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite-hostport_not_used: resource kind: {kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"} I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "litmuschaos.io/chaos": "true", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 4, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4961737", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "availableReplicas": 1, "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 4, "readyReplicas": 1, "replicas": 1, "updatedReplicas": 1 } } D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite-hostport_not_used: resource: {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"annotations" => {"deployment.kubernetes.io/revision" => "1", "litmuschaos.io/chaos" => "true", "meta.helm.sh/release-name" => "coredns", "meta.helm.sh/release-namespace" => "cnf-default"}, "creationTimestamp" => "2025-03-06T11:52:37Z", "generation" => 4, "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/name" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS"}, "name" => "coredns-coredns", "namespace" => "cnf-default", "resourceVersion" => "4961737", "uid" => "489e7e00-25be-4697-9d6f-9e9bc6689c66"}, "spec" => {"progressDeadlineSeconds" => 600, "replicas" => 1, "revisionHistoryLimit" => 10, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"}}, "strategy" => {"rollingUpdate" => {"maxSurge" => "25%", "maxUnavailable" => 1}, "type" => "RollingUpdate"}, "template" => {"metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => nil, "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"}}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}]}], "dnsPolicy" => "Default", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}]}}}, "status" => {"availableReplicas" => 1, "conditions" => [{"lastTransitionTime" => "2025-03-06T11:52:37Z", "lastUpdateTime" => "2025-03-06T11:52:52Z", "message" => "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason" => "NewReplicaSetAvailable", "status" => "True", "type" => "Progressing"}, {"lastTransitionTime" => "2025-03-06T11:53:07Z", "lastUpdateTime" => "2025-03-06T11:53:07Z", "message" => "Deployment has minimum availability.", "reason" => "MinimumReplicasAvailable", "status" => "True", "type" => "Available"}], "observedGeneration" => 4, "readyReplicas" => 1, "replicas" => 1, "updatedReplicas" => 1}} D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite-hostport_not_used: containers: [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}]}] D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite-hostport_not_used: single_port: {"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"} D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite-hostport_not_used: DAS hostPort: D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite-hostport_not_used: single_port: {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"} D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite-hostport_not_used: DAS hostPort: D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: yield resp: true I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite-KubectlClient::Get.resource_volumes: Service resource_name: coredns-coredns namespace: cnf-default I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: checking service: {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"} I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite-hostport_not_used: hostport_not_used resource: {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"} I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite-hostport_not_used: resource kind: {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"} I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Service coredns-coredns -o json -n cnf-default ✔️ 🏆PASSED: [hostport_not_used] HostPort is not used  D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "v1", "kind": "Service", "metadata": { "annotations": { "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4961324", "uid": "f68b6cb0-976c-4981-8bdd-fe80a4e0d6f0" }, "spec": { "clusterIP": "10.96.24.213", "clusterIPs": [ "10.96.24.213" ], "internalTrafficPolicy": "Cluster", "ipFamilies": [ "IPv4" ], "ipFamilyPolicy": "SingleStack", "ports": [ { "name": "udp-53", "port": 53, "protocol": "UDP", "targetPort": 53 }, { "name": "tcp-53", "port": 53, "protocol": "TCP", "targetPort": 53 } ], "selector": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" }, "sessionAffinity": "None", "type": "ClusterIP" }, "status": { "loadBalancer": {} } } D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite-hostport_not_used: resource: {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"annotations" => {"meta.helm.sh/release-name" => "coredns", "meta.helm.sh/release-namespace" => "cnf-default"}, "creationTimestamp" => "2025-03-06T11:52:37Z", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/name" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS"}, "name" => "coredns-coredns", "namespace" => "cnf-default", "resourceVersion" => "4961324", "uid" => "f68b6cb0-976c-4981-8bdd-fe80a4e0d6f0"}, "spec" => {"clusterIP" => "10.96.24.213", "clusterIPs" => ["10.96.24.213"], "internalTrafficPolicy" => "Cluster", "ipFamilies" => ["IPv4"], "ipFamilyPolicy" => "SingleStack", "ports" => [{"name" => "udp-53", "port" => 53, "protocol" => "UDP", "targetPort" => 53}, {"name" => "tcp-53", "port" => 53, "protocol" => "TCP", "targetPort" => 53}], "selector" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"}, "sessionAffinity" => "None", "type" => "ClusterIP"}, "status" => {"loadBalancer" => {}}} D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite-hostport_not_used: containers: D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: yield resp: true D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: workload resource test intialized: true test_passed: true I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "hostport_not_used", "tags" => ["configuration", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["configuration", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: resp: ["configuration", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_type x: configuration acc: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_points: task: hostport_not_used is worth: 100 points I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: cmd: /usr/local/bin/cnf-testsuite cert I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite-hostport_not_used: task_runtime=00:00:00.431756928; start_time=2025-03-06 11:56:45 UTC; end_time:2025-03-06 11:56:45 UTC I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "hostport_not_used", "tags" => ["configuration", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["configuration", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: resp: ["configuration", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_type x: configuration acc: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: upsert_task: task: hostport_not_used has status: passed and is awarded: 100 points. Runtime: 00:00:00.431756928 I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_runner args: # I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: ensure_cnf_installed? true I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: check_cnf_config args: # I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: check_cnf_config cnf: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [hardcoded_ip_addresses_in_k8s_runtime_configuration] I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: CNF configs found: 1 D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: single_task_runner args: # "installed_cnf_files/cnf-testsuite.yml"}> I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite-hardcoded_ip_addresses_in_k8s_runtime_configuration: Starting test D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite-hardcoded_ip_addresses_in_k8s_runtime_configuration: cnf_config: # D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: helm_v3?: BuildInfo{Version:"v3.6.0", GitCommit:"7f2df6467771a75f5646b7f12afb408590ed1755", GitTreeState:"clean", GoVersion:"go1.16.3" I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Delete.command command: kubectl delete namespace hardcoded-ip-test --force --grace-period 0 ✔️ 🏆PASSED: [hardcoded_ip_addresses_in_k8s_runtime_configuration] No hard-coded IP addresses found in the runtime K8s configuration  D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Delete.command output: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Delete.command stderr: Warning: Immediate deletion does not wait for confirmation that the running resource has been terminated. The resource may continue to run on the cluster indefinitely. Error from server (NotFound): namespaces "hardcoded-ip-test" not found I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "tags" => ["configuration", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["configuration", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: resp: ["configuration", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_type x: configuration acc: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_points: task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: cmd: /usr/local/bin/cnf-testsuite cert I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite-hardcoded_ip_addresses_in_k8s_runtime_configuration: task_runtime=00:00:00.169550218; start_time=2025-03-06 11:56:45 UTC; end_time:2025-03-06 11:56:45 UTC I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "tags" => ["configuration", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["configuration", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: resp: ["configuration", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_type x: configuration acc: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: upsert_task: task: hardcoded_ip_addresses_in_k8s_runtime_configuration has status: passed and is awarded: 100 points. Runtime: 00:00:00.169550218 I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: task_runner args: # I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: ensure_cnf_installed? true I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: check_cnf_config args: # I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: check_cnf_config cnf: I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [latest_tag] I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite: CNF configs found: 1 D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite: single_task_runner args: # "installed_cnf_files/cnf-testsuite.yml"}> I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite-latest_tag: Starting test D, [2025-03-06 11:56:45 UTC #1422] DEBUG -- cnf-testsuite-latest_tag: cnf_config: # I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite-kyverno_policy_path: command: ls /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/disallow_latest_tag/disallow_latest_tag.yaml I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite-kyverno_policy_path: output: /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/disallow_latest_tag/disallow_latest_tag.yaml I, [2025-03-06 11:56:45 UTC #1422] INFO -- cnf-testsuite-Kyverno::PolicyAudit.run: command: /home/xtesting/.cnf-testsuite/tools/kyverno apply /home/xtesting/.cnf-testsuite/tools/kyverno-policies/best-practices/disallow_latest_tag/disallow_latest_tag.yaml --cluster --policy-report ✔️ 🏆PASSED: [latest_tag] Container images are not using the latest tag 🏷️ I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite-Kyverno::PolicyAudit.run: output: Applying 2 policy rules to 28 resources... ---------------------------------------------------------------------- POLICY REPORT: ---------------------------------------------------------------------- apiVersion: wgpolicyk8s.io/v1alpha2 kind: ClusterPolicyReport metadata: name: clusterpolicyreport results: - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: e8f151b3-d960-455d-8972-96ef88e7df67 result: skip rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: e8f151b3-d960-455d-8972-96ef88e7df67 result: skip rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'autogen-require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: e8f151b3-d960-455d-8972-96ef88e7df67 result: pass rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: e8f151b3-d960-455d-8972-96ef88e7df67 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'autogen-validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: e8f151b3-d960-455d-8972-96ef88e7df67 result: pass rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: chaos-operator-ce namespace: litmus uid: e8f151b3-d960-455d-8972-96ef88e7df67 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-m65r6 namespace: litmus uid: ee9767f8-1757-4222-a67b-92ea555912b8 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-m65r6 namespace: litmus uid: ee9767f8-1757-4222-a67b-92ea555912b8 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-m65r6 namespace: litmus uid: ee9767f8-1757-4222-a67b-92ea555912b8 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-m65r6 namespace: litmus uid: ee9767f8-1757-4222-a67b-92ea555912b8 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-m65r6 namespace: litmus uid: ee9767f8-1757-4222-a67b-92ea555912b8 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: chaos-operator-ce-7d9fdb77d5-m65r6 namespace: litmus uid: ee9767f8-1757-4222-a67b-92ea555912b8 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 489e7e00-25be-4697-9d6f-9e9bc6689c66 result: skip rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 489e7e00-25be-4697-9d6f-9e9bc6689c66 result: skip rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'autogen-require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 489e7e00-25be-4697-9d6f-9e9bc6689c66 result: pass rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 489e7e00-25be-4697-9d6f-9e9bc6689c66 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'autogen-validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 489e7e00-25be-4697-9d6f-9e9bc6689c66 result: pass rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns-coredns namespace: cnf-default uid: 489e7e00-25be-4697-9d6f-9e9bc6689c66 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-coredns-64fc886fd4-clwtn namespace: cnf-default uid: 1493bcca-c392-4f42-8125-d050b7590390 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-coredns-64fc886fd4-clwtn namespace: cnf-default uid: 1493bcca-c392-4f42-8125-d050b7590390 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-coredns-64fc886fd4-clwtn namespace: cnf-default uid: 1493bcca-c392-4f42-8125-d050b7590390 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-coredns-64fc886fd4-clwtn namespace: cnf-default uid: 1493bcca-c392-4f42-8125-d050b7590390 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-coredns-64fc886fd4-clwtn namespace: cnf-default uid: 1493bcca-c392-4f42-8125-d050b7590390 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-coredns-64fc886fd4-clwtn namespace: cnf-default uid: 1493bcca-c392-4f42-8125-d050b7590390 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 76a4ac07-175e-48d4-bd2a-be80b22f00b8 result: skip rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 76a4ac07-175e-48d4-bd2a-be80b22f00b8 result: skip rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'autogen-require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 76a4ac07-175e-48d4-bd2a-be80b22f00b8 result: pass rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 76a4ac07-175e-48d4-bd2a-be80b22f00b8 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'autogen-validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 76a4ac07-175e-48d4-bd2a-be80b22f00b8 result: pass rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: cluster-tools namespace: cnf-testsuite uid: 76a4ac07-175e-48d4-bd2a-be80b22f00b8 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-vg86b namespace: cnf-testsuite uid: c163624b-e2b0-462b-bb0a-34fe5551b1fa result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-vg86b namespace: cnf-testsuite uid: c163624b-e2b0-462b-bb0a-34fe5551b1fa result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-vg86b namespace: cnf-testsuite uid: c163624b-e2b0-462b-bb0a-34fe5551b1fa result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-vg86b namespace: cnf-testsuite uid: c163624b-e2b0-462b-bb0a-34fe5551b1fa result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-vg86b namespace: cnf-testsuite uid: c163624b-e2b0-462b-bb0a-34fe5551b1fa result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-vg86b namespace: cnf-testsuite uid: c163624b-e2b0-462b-bb0a-34fe5551b1fa result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-mh426 namespace: cnf-testsuite uid: 95aa40ad-9e0e-486b-a5d0-41f9194fd651 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-mh426 namespace: cnf-testsuite uid: 95aa40ad-9e0e-486b-a5d0-41f9194fd651 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-mh426 namespace: cnf-testsuite uid: 95aa40ad-9e0e-486b-a5d0-41f9194fd651 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-mh426 namespace: cnf-testsuite uid: 95aa40ad-9e0e-486b-a5d0-41f9194fd651 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-mh426 namespace: cnf-testsuite uid: 95aa40ad-9e0e-486b-a5d0-41f9194fd651 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: cluster-tools-mh426 namespace: cnf-testsuite uid: 95aa40ad-9e0e-486b-a5d0-41f9194fd651 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 99b15287-c7c3-412d-8f1d-f5fbcb053df1 result: skip rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 99b15287-c7c3-412d-8f1d-f5fbcb053df1 result: skip rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'autogen-require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 99b15287-c7c3-412d-8f1d-f5fbcb053df1 result: pass rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 99b15287-c7c3-412d-8f1d-f5fbcb053df1 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'autogen-validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 99b15287-c7c3-412d-8f1d-f5fbcb053df1 result: pass rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: local-path-provisioner namespace: local-path-storage uid: 99b15287-c7c3-412d-8f1d-f5fbcb053df1 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-58cc7856b6-xpr8d namespace: local-path-storage uid: f70efa34-43ee-49b2-8d40-494399374974 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-58cc7856b6-xpr8d namespace: local-path-storage uid: f70efa34-43ee-49b2-8d40-494399374974 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-58cc7856b6-xpr8d namespace: local-path-storage uid: f70efa34-43ee-49b2-8d40-494399374974 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-58cc7856b6-xpr8d namespace: local-path-storage uid: f70efa34-43ee-49b2-8d40-494399374974 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-58cc7856b6-xpr8d namespace: local-path-storage uid: f70efa34-43ee-49b2-8d40-494399374974 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: local-path-provisioner-58cc7856b6-xpr8d namespace: local-path-storage uid: f70efa34-43ee-49b2-8d40-494399374974 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7th7s namespace: kube-system uid: e8cdf891-c99d-456e-97a1-587cd1464f6a result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7th7s namespace: kube-system uid: e8cdf891-c99d-456e-97a1-587cd1464f6a result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7th7s namespace: kube-system uid: e8cdf891-c99d-456e-97a1-587cd1464f6a result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7th7s namespace: kube-system uid: e8cdf891-c99d-456e-97a1-587cd1464f6a result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7th7s namespace: kube-system uid: e8cdf891-c99d-456e-97a1-587cd1464f6a result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-7th7s namespace: kube-system uid: e8cdf891-c99d-456e-97a1-587cd1464f6a result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3bd38cf6-1ff8-44a5-8759-66ddd18a24bf result: skip rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3bd38cf6-1ff8-44a5-8759-66ddd18a24bf result: skip rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'autogen-require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3bd38cf6-1ff8-44a5-8759-66ddd18a24bf result: pass rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3bd38cf6-1ff8-44a5-8759-66ddd18a24bf result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'autogen-validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3bd38cf6-1ff8-44a5-8759-66ddd18a24bf result: pass rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kube-proxy namespace: kube-system uid: 3bd38cf6-1ff8-44a5-8759-66ddd18a24bf result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 0c9d06dd-32e7-495f-ae06-c55e4286129c result: skip rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 0c9d06dd-32e7-495f-ae06-c55e4286129c result: skip rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'autogen-require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 0c9d06dd-32e7-495f-ae06-c55e4286129c result: pass rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 0c9d06dd-32e7-495f-ae06-c55e4286129c result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'autogen-validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 0c9d06dd-32e7-495f-ae06-c55e4286129c result: pass rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: create-loop-devs namespace: kube-system uid: 0c9d06dd-32e7-495f-ae06-c55e4286129c result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: 98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: 98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: 98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: 98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: 98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: etcd-v132-control-plane namespace: kube-system uid: 98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-n2gsh namespace: kube-system uid: 4a823046-cae0-4bb3-936a-64a078683298 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-n2gsh namespace: kube-system uid: 4a823046-cae0-4bb3-936a-64a078683298 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-n2gsh namespace: kube-system uid: 4a823046-cae0-4bb3-936a-64a078683298 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-n2gsh namespace: kube-system uid: 4a823046-cae0-4bb3-936a-64a078683298 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-n2gsh namespace: kube-system uid: 4a823046-cae0-4bb3-936a-64a078683298 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-n2gsh namespace: kube-system uid: 4a823046-cae0-4bb3-936a-64a078683298 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-ssh49 namespace: kube-system uid: 59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-ssh49 namespace: kube-system uid: 59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-ssh49 namespace: kube-system uid: 59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-ssh49 namespace: kube-system uid: 59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-ssh49 namespace: kube-system uid: 59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-ssh49 namespace: kube-system uid: 59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: 5b0261cd-89a1-46a4-97b3-f87aadbe4002 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: 5b0261cd-89a1-46a4-97b3-f87aadbe4002 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: 5b0261cd-89a1-46a4-97b3-f87aadbe4002 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: 5b0261cd-89a1-46a4-97b3-f87aadbe4002 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: 5b0261cd-89a1-46a4-97b3-f87aadbe4002 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-scheduler-v132-control-plane namespace: kube-system uid: 5b0261cd-89a1-46a4-97b3-f87aadbe4002 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-q7fmz namespace: kube-system uid: 064549ca-14e3-4970-b40f-29de7cfe116f result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-q7fmz namespace: kube-system uid: 064549ca-14e3-4970-b40f-29de7cfe116f result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-q7fmz namespace: kube-system uid: 064549ca-14e3-4970-b40f-29de7cfe116f result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-q7fmz namespace: kube-system uid: 064549ca-14e3-4970-b40f-29de7cfe116f result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-q7fmz namespace: kube-system uid: 064549ca-14e3-4970-b40f-29de7cfe116f result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-q7fmz namespace: kube-system uid: 064549ca-14e3-4970-b40f-29de7cfe116f result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-k7lcp namespace: kube-system uid: 5ab0230a-25d6-4060-bc00-a54f5f07b579 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-k7lcp namespace: kube-system uid: 5ab0230a-25d6-4060-bc00-a54f5f07b579 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-k7lcp namespace: kube-system uid: 5ab0230a-25d6-4060-bc00-a54f5f07b579 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-k7lcp namespace: kube-system uid: 5ab0230a-25d6-4060-bc00-a54f5f07b579 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-k7lcp namespace: kube-system uid: 5ab0230a-25d6-4060-bc00-a54f5f07b579 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-k7lcp namespace: kube-system uid: 5ab0230a-25d6-4060-bc00-a54f5f07b579 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: dbe3c81f-b1df-4801-9788-76a8bdb5ae88 result: skip rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: dbe3c81f-b1df-4801-9788-76a8bdb5ae88 result: skip rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'autogen-require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: dbe3c81f-b1df-4801-9788-76a8bdb5ae88 result: pass rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: dbe3c81f-b1df-4801-9788-76a8bdb5ae88 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'autogen-validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: dbe3c81f-b1df-4801-9788-76a8bdb5ae88 result: pass rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: DaemonSet name: kindnet namespace: kube-system uid: dbe3c81f-b1df-4801-9788-76a8bdb5ae88 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-nh5jq namespace: kube-system uid: 6cb7a212-fae9-4286-a247-4fdedccaaef0 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-nh5jq namespace: kube-system uid: 6cb7a212-fae9-4286-a247-4fdedccaaef0 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-nh5jq namespace: kube-system uid: 6cb7a212-fae9-4286-a247-4fdedccaaef0 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-nh5jq namespace: kube-system uid: 6cb7a212-fae9-4286-a247-4fdedccaaef0 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-nh5jq namespace: kube-system uid: 6cb7a212-fae9-4286-a247-4fdedccaaef0 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: coredns-668d6bf9bc-nh5jq namespace: kube-system uid: 6cb7a212-fae9-4286-a247-4fdedccaaef0 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-dkr2j namespace: kube-system uid: 14b0603b-2896-496e-84e3-572ff7452828 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-dkr2j namespace: kube-system uid: 14b0603b-2896-496e-84e3-572ff7452828 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-dkr2j namespace: kube-system uid: 14b0603b-2896-496e-84e3-572ff7452828 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-dkr2j namespace: kube-system uid: 14b0603b-2896-496e-84e3-572ff7452828 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-dkr2j namespace: kube-system uid: 14b0603b-2896-496e-84e3-572ff7452828 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-proxy-dkr2j namespace: kube-system uid: 14b0603b-2896-496e-84e3-572ff7452828 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-kj9qx namespace: kube-system uid: d57bb953-a274-4ab3-9e0d-ecd30b29e177 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-kj9qx namespace: kube-system uid: d57bb953-a274-4ab3-9e0d-ecd30b29e177 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-kj9qx namespace: kube-system uid: d57bb953-a274-4ab3-9e0d-ecd30b29e177 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-kj9qx namespace: kube-system uid: d57bb953-a274-4ab3-9e0d-ecd30b29e177 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-kj9qx namespace: kube-system uid: d57bb953-a274-4ab3-9e0d-ecd30b29e177 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-kj9qx namespace: kube-system uid: d57bb953-a274-4ab3-9e0d-ecd30b29e177 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 55badffb-46f4-4ed0-a515-3da36c21bd5a result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 55badffb-46f4-4ed0-a515-3da36c21bd5a result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 55badffb-46f4-4ed0-a515-3da36c21bd5a result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 55badffb-46f4-4ed0-a515-3da36c21bd5a result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 55badffb-46f4-4ed0-a515-3da36c21bd5a result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-apiserver-v132-control-plane namespace: kube-system uid: 55badffb-46f4-4ed0-a515-3da36c21bd5a result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 6087f159-3f81-44a8-8c58-4530c3060568 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 6087f159-3f81-44a8-8c58-4530c3060568 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 6087f159-3f81-44a8-8c58-4530c3060568 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 6087f159-3f81-44a8-8c58-4530c3060568 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 6087f159-3f81-44a8-8c58-4530c3060568 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kube-controller-manager-v132-control-plane namespace: kube-system uid: 6087f159-3f81-44a8-8c58-4530c3060568 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: f81a8b42-0344-426c-9f14-f8eafd1b50fb result: skip rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: f81a8b42-0344-426c-9f14-f8eafd1b50fb result: skip rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'autogen-require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: f81a8b42-0344-426c-9f14-f8eafd1b50fb result: pass rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: f81a8b42-0344-426c-9f14-f8eafd1b50fb result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'autogen-validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: f81a8b42-0344-426c-9f14-f8eafd1b50fb result: pass rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: apps/v1 kind: Deployment name: coredns namespace: kube-system uid: f81a8b42-0344-426c-9f14-f8eafd1b50fb result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-5d7tp namespace: kube-system uid: 740809cc-4bf8-40e5-a556-d39f5cf1ff03 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-5d7tp namespace: kube-system uid: 740809cc-4bf8-40e5-a556-d39f5cf1ff03 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-5d7tp namespace: kube-system uid: 740809cc-4bf8-40e5-a556-d39f5cf1ff03 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-5d7tp namespace: kube-system uid: 740809cc-4bf8-40e5-a556-d39f5cf1ff03 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-5d7tp namespace: kube-system uid: 740809cc-4bf8-40e5-a556-d39f5cf1ff03 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-5d7tp namespace: kube-system uid: 740809cc-4bf8-40e5-a556-d39f5cf1ff03 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-qnxv9 namespace: kube-system uid: b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8 result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-qnxv9 namespace: kube-system uid: b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8 result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-qnxv9 namespace: kube-system uid: b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8 result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-qnxv9 namespace: kube-system uid: b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8 result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-qnxv9 namespace: kube-system uid: b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8 result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: create-loop-devs-qnxv9 namespace: kube-system uid: b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8 result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'require-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-4s8ph namespace: kube-system uid: 0f87ae31-f6df-43d6-b42a-0236e849318a result: pass rule: require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: validation rule 'validate-image-tag' passed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-4s8ph namespace: kube-system uid: 0f87ae31-f6df-43d6-b42a-0236e849318a result: pass rule: validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-4s8ph namespace: kube-system uid: 0f87ae31-f6df-43d6-b42a-0236e849318a result: skip rule: autogen-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: An image tag is required. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-4s8ph namespace: kube-system uid: 0f87ae31-f6df-43d6-b42a-0236e849318a result: skip rule: autogen-cronjob-require-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-4s8ph namespace: kube-system uid: 0f87ae31-f6df-43d6-b42a-0236e849318a result: skip rule: autogen-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 - message: Using a mutable image tag e.g. 'latest' is not allowed. policy: disallow-latest-tag resources: - apiVersion: v1 kind: Pod name: kindnet-4s8ph namespace: kube-system uid: 0f87ae31-f6df-43d6-b42a-0236e849318a result: skip rule: autogen-cronjob-validate-image-tag scored: true source: kyverno timestamp: nanos: 0 seconds: 1741262207 summary: error: 0 fail: 0 pass: 56 skip: 112 warn: 0 I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: cnf_resource_ymls I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: manifest_path_to_ymls file_path: installed_cnf_files/common_manifest.yml I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: manifest_string_to_ymls D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: manifest_string_to_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: cnf_resource_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Deployment D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"} D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Service D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"} D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: {} D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Pod D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ReplicaSet D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: StatefulSet D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: DaemonSet D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ServiceAccount D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: resources: [] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: all resource: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: cnf-default,deployment/coredns-coredns D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: cnf-default,service/coredns-coredns D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: task latest_tag emoji: 🏷️ I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "latest_tag", "emoji" => "🏷️", "tags" => ["configuration", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["configuration", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: resp: ["configuration", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_type x: configuration acc: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_points: task: latest_tag is worth: 100 points I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: cmd: /usr/local/bin/cnf-testsuite cert I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite-latest_tag: task_runtime=00:00:01.958203926; start_time=2025-03-06 11:56:45 UTC; end_time:2025-03-06 11:56:47 UTC I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "latest_tag", "emoji" => "🏷️", "tags" => ["configuration", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["configuration", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: resp: ["configuration", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_type x: configuration acc: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: upsert_task: task: latest_tag has status: passed and is awarded: 100 points. Runtime: 00:00:01.958203926 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name versioned_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name ip_addresses D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name operator_installed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name nodeport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name hostport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name secrets_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name immutable_configmap D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name alpha_k8s_apis D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name require_labels D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name default_namespace D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name latest_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["configuration", "cert"], found tasks: ["hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "latest_tag"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["configuration", "cert"], increase_decrease_capacity = 100 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["configuration", "cert"], node_drain = 100 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["configuration", "cert"], privileged_containers = 100 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["configuration", "cert"], non_root_containers = 0 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["configuration", "cert"], cpu_limits = 100 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["configuration", "cert"], memory_limits = 100 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["configuration", "cert"], hostpath_mounts = 100 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["configuration", "cert"], container_sock_mounts = 100 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["configuration", "cert"], selinux_options = 0 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["configuration", "cert"], hostport_not_used = 100 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["configuration", "cert"], hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["configuration", "cert"], latest_tag = 100 I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: total_points: ["configuration", "cert"] = 300 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_max_points tag: ["configuration", "cert"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name versioned_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name ip_addresses D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name operator_installed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name nodeport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name hostport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name secrets_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name immutable_configmap D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name alpha_k8s_apis D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name require_labels D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name default_namespace D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name latest_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks - bonus tasks: 3 I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped tests [] I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: failed tests ["non_root_containers"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name service_discovery D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_latency D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_corruption D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_duplication D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_io_stress D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name operator_installed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name secrets_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_configmap D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name no_local_volume_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name elastic_volumes D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name linux_hardening D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_file_systems D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name ingress_egress_blocked D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name prometheus_traffic D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name open_metrics D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name routed_logs D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name tracing D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: bonus tasks ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task reduce x: hostport_not_used I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_points: task: hostport_not_used is worth: 100 points I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task reduce x: hardcoded_ip_addresses_in_k8s_runtime_configuration I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_points: task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task reduce x: latest_tag I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_points: task: latest_tag is worth: 100 points I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: total_max_points: ["configuration", "cert"] = 300 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_passed: ["configuration", "cert"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name versioned_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name ip_addresses D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name operator_installed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name nodeport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name hostport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name secrets_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name immutable_configmap D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name alpha_k8s_apis D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name require_labels D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name default_namespace D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name latest_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["configuration", "cert"], found tasks: ["hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "latest_tag"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["configuration", "cert"], increase_decrease_capacity = 100 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["configuration", "cert"], node_drain = 100 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["configuration", "cert"], privileged_containers = 100 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["configuration", "cert"], non_root_containers = 0 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["configuration", "cert"], cpu_limits = 100 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["configuration", "cert"], memory_limits = 100 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["configuration", "cert"], hostpath_mounts = 100 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["configuration", "cert"], container_sock_mounts = 100 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["configuration", "cert"], selinux_options = 0 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["configuration", "cert"], hostport_not_used = 100 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["configuration", "cert"], hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["configuration", "cert"], latest_tag = 100 I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: total_passed: ["configuration", "cert"] = 3 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_max_passed tag: ["configuration", "cert"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name versioned_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name ip_addresses D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name operator_installed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name nodeport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name hostport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name secrets_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name immutable_configmap D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name alpha_k8s_apis D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name require_labels D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name default_namespace D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["configuration"] name latest_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:configuration, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: total_max_passed tasks: ["hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "latest_tag"] I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: failed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: na I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: failed tests ["non_root_containers"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name service_discovery D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_latency D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_corruption D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_duplication D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_io_stress D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name operator_installed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name secrets_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_configmap D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name no_local_volume_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name elastic_volumes D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name linux_hardening D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_file_systems D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name ingress_egress_blocked D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name prometheus_traffic D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name open_metrics D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name routed_logs D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name tracing D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: bonus tasks ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: tasks x: hostport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_points: task: hostport_not_used is worth: 100 points I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: tasks x: hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_points: task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: tasks x: latest_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_points: task: latest_tag is worth: 100 points I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: total_max_passed: ["configuration", "cert"] = 3 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_passed: ["essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name specialized_init_system D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name single_process_type D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name zombie_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name sig_term_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name increase_decrease_capacity D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name liveness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name readiness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name node_drain D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name privileged_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name non_root_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name cpu_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name memory_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostpath_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name log_output D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name container_sock_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name selinux_options D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name latest_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], increase_decrease_capacity = 100 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], node_drain = 100 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], privileged_containers = 100 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], non_root_containers = 0 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], cpu_limits = 100 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], memory_limits = 100 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], hostpath_mounts = 100 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], container_sock_mounts = 100 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], selinux_options = 0 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], hostport_not_used = 100 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], latest_tag = 100 I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: total_passed: ["essential"] = 10 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_max_passed tag: ["essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name specialized_init_system D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name single_process_type D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name zombie_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name sig_term_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name increase_decrease_capacity D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name liveness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name readiness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name node_drain D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name privileged_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name non_root_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name cpu_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name memory_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostpath_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name log_output D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name container_sock_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name selinux_options D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name latest_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: total_max_passed tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: failed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: na I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: failed tests ["non_root_containers"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name service_discovery D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus Configuration results: 3 of 3 tests passed  Observability and Diagnostics Tests D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_latency D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_corruption D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_duplication D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_io_stress D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name operator_installed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name secrets_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_configmap D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name no_local_volume_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name elastic_volumes D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name linux_hardening D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_file_systems D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name ingress_egress_blocked D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name prometheus_traffic D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name open_metrics D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name routed_logs D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name tracing D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: bonus tasks ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: tasks x: specialized_init_system D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_points: task: specialized_init_system is worth: 100 points I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: tasks x: single_process_type D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_points: task: single_process_type is worth: 100 points I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: tasks x: zombie_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_points: task: zombie_handled is worth: 100 points I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: tasks x: sig_term_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_points: task: sig_term_handled is worth: 100 points I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: tasks x: increase_decrease_capacity D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_points: task: increase_decrease_capacity is worth: 100 points I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: tasks x: liveness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_points: task: liveness is worth: 100 points I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: tasks x: readiness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_points: task: readiness is worth: 100 points I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: tasks x: hostport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_points: task: hostport_not_used is worth: 100 points I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: tasks x: hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_points: task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: tasks x: node_drain D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_points: task: node_drain is worth: 100 points I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: tasks x: privileged_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_points: task: privileged_containers is worth: 100 points I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) true D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: tasks x: non_root_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_points: task: non_root_containers is worth: 100 points I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: tasks x: cpu_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_points: task: cpu_limits is worth: 100 points I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: tasks x: memory_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_points: task: memory_limits is worth: 100 points I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: tasks x: hostpath_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_points: task: hostpath_mounts is worth: 100 points I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: tasks x: log_output D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_points: task: log_output is worth: 100 points I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: tasks x: container_sock_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_points: task: container_sock_mounts is worth: 100 points I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, selinux_options = 0 status = na I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: tasks x: selinux_options D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, selinux_options = 0 status = na I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: na_assigned for selinux_options I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: tasks x: latest_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, node_drain = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, privileged_containers = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, non_root_containers = 0 status = failed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, cpu_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, memory_limits = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, selinux_options = 0 status = na D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, latest_tag = 100 status = passed I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_points: task: latest_tag is worth: 100 points I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: total_max_passed: ["essential"] = 18 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 500, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}]} D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 300, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}]} D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 300, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}]} D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 300, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}], "maximum_points" => 300} D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["observability"] name log_output D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["observability"] name prometheus_traffic D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["observability"] name open_metrics D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["observability"] name routed_logs D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["observability"] name tracing D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: task_runner args: # I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: ensure_cnf_installed? true I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: check_cnf_config args: # I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: check_cnf_config cnf: I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [log_output] I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: CNF configs found: 1 D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: single_task_runner args: # "installed_cnf_files/cnf-testsuite.yml"}> I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite-log_output: Starting test D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite-log_output: cnf_config: # I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: cnf_resource_ymls I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: manifest_path_to_ymls file_path: installed_cnf_files/common_manifest.yml I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: manifest_string_to_ymls D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: manifest_string_to_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: cnf_resource_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Deployment D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"} D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Service D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"} D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: {} D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Pod D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ReplicaSet D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: StatefulSet D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: DaemonSet D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ServiceAccount D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: resources: [] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: all resource: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}} D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}} D, [2025-03-06 11:56:47 UTC #1422] DEBUG -- cnf-testsuite: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite-KubectlClient::Get.resource_volumes: Deployment resource_name: coredns-coredns namespace: cnf-default I, [2025-03-06 11:56:47 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "litmuschaos.io/chaos": "true", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 4, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4961737", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "availableReplicas": 1, "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 4, "readyReplicas": 1, "replicas": 1, "updatedReplicas": 1 } } I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: kubectl get resource volumes: [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: kubectl get resource containers kind: Deployment resource_name: coredns-coredns namespace: cnf-default I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "litmuschaos.io/chaos": "true", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 4, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4961737", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "availableReplicas": 1, "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 4, "readyReplicas": 1, "replicas": 1, "updatedReplicas": 1 } } D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: kubectl get resource containers: [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}]}] ✔️ 🏆PASSED: [log_output] Resources output logs to stdout and stderr 📶☠️ D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.logs output: [pod/coredns-coredns-64fc886fd4-clwtn/coredns] .:53 [pod/coredns-coredns-64fc886fd4-clwtn/coredns] [INFO] plugin/reload: Running configuration MD5 = d8c79061f144bdb41e9378f9aa781f71 [pod/coredns-coredns-64fc886fd4-clwtn/coredns] CoreDNS-1.7.1 [pod/coredns-coredns-64fc886fd4-clwtn/coredns] linux/amd64, go1.15.2, aa82ca6 I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: KubectlClient.logs stderr: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite-Log lines: [pod/coredns-coredns-64fc886fd4-clwtn/coredns] .:53 [pod/coredns-coredns-64fc886fd4-clwtn/coredns] [INFO] plugin/reload: Running configuration MD5 = d8c79061f144bdb41e9378f9aa781f71 [pod/coredns-coredns-64fc886fd4-clwtn/coredns] CoreDNS-1.7.1 [pod/coredns-coredns-64fc886fd4-clwtn/coredns] linux/amd64, go1.15.2, aa82ca6 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: yield resp: true I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite-KubectlClient::Get.resource_volumes: Service resource_name: coredns-coredns namespace: cnf-default D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: workload resource test intialized: true test_passed: true D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: task log_output emoji: 📶☠️ I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "log_output", "emoji" => "📶☠️", "tags" => ["observability", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["observability", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: resp: ["observability", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_type x: observability acc: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_points: task: log_output is worth: 100 points I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: cmd: /usr/local/bin/cnf-testsuite cert I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite-log_output: task_runtime=00:00:00.364081888; start_time=2025-03-06 11:56:47 UTC; end_time:2025-03-06 11:56:48 UTC I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "log_output", "emoji" => "📶☠️", "tags" => ["observability", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["observability", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: resp: ["observability", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_type x: observability acc: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: upsert_task: task: log_output has status: passed and is awarded: 100 points. Runtime: 00:00:00.364081888 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["observability"] name log_output D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["observability"] name prometheus_traffic D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["observability"] name open_metrics D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["observability"] name routed_logs D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["observability"] name tracing D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["observability", "cert"], found tasks: ["log_output"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["observability", "cert"], increase_decrease_capacity = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["observability", "cert"], node_drain = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["observability", "cert"], privileged_containers = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["observability", "cert"], non_root_containers = 0 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["observability", "cert"], cpu_limits = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["observability", "cert"], memory_limits = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["observability", "cert"], hostpath_mounts = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["observability", "cert"], container_sock_mounts = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["observability", "cert"], selinux_options = 0 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["observability", "cert"], hostport_not_used = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["observability", "cert"], hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["observability", "cert"], latest_tag = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["observability", "cert"], log_output = 100 I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: total_points: ["observability", "cert"] = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_max_points tag: ["observability", "cert"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["observability"] name log_output D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["observability"] name prometheus_traffic D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["observability"] name open_metrics D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["observability"] name routed_logs D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["observability"] name tracing D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks - bonus tasks: 1 I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped tests [] I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: failed tests ["non_root_containers"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name service_discovery D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_latency D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_corruption D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_duplication D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_io_stress D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name operator_installed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name secrets_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_configmap D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name no_local_volume_configuration D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name elastic_volumes D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name linux_hardening D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_file_systems D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name ingress_egress_blocked D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name prometheus_traffic D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name open_metrics D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name routed_logs D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name tracing D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: bonus tasks ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task reduce x: log_output I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_points: task: log_output is worth: 100 points I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: total_max_points: ["observability", "cert"] = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_passed: ["observability", "cert"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["observability"] name log_output D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["observability"] name prometheus_traffic D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["observability"] name open_metrics D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["observability"] name routed_logs D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["observability"] name tracing D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["observability", "cert"], found tasks: ["log_output"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["observability", "cert"], increase_decrease_capacity = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["observability", "cert"], node_drain = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["observability", "cert"], privileged_containers = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["observability", "cert"], non_root_containers = 0 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["observability", "cert"], cpu_limits = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["observability", "cert"], memory_limits = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["observability", "cert"], hostpath_mounts = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["observability", "cert"], container_sock_mounts = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["observability", "cert"], selinux_options = 0 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["observability", "cert"], hostport_not_used = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["observability", "cert"], hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["observability", "cert"], latest_tag = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["observability", "cert"], log_output = 100 I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: total_passed: ["observability", "cert"] = 1 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_max_passed tag: ["observability", "cert"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["observability"] name log_output D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["observability"] name prometheus_traffic D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["observability"] name open_metrics D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["observability"] name routed_logs D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["observability"] name tracing D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:observability, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: observability D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: total_max_passed tasks: ["log_output"] I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: failed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: na I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: failed tests ["non_root_containers"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name service_discovery D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_latency D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_corruption D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_duplication D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_io_stress D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name operator_installed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name secrets_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_configmap D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name no_local_volume_configuration D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name elastic_volumes D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name linux_hardening D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_file_systems D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name ingress_egress_blocked D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name prometheus_traffic D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name open_metrics D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name routed_logs D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name tracing D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: bonus tasks ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: tasks x: log_output D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_points: task: log_output is worth: 100 points I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: total_max_passed: ["observability", "cert"] = 1 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_passed: ["essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name specialized_init_system D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name single_process_type D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name zombie_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name sig_term_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name increase_decrease_capacity D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name liveness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name readiness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostport_not_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name node_drain D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name privileged_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name non_root_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name cpu_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name memory_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostpath_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name log_output D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name container_sock_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name selinux_options D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name latest_tag D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], increase_decrease_capacity = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], node_drain = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], privileged_containers = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], non_root_containers = 0 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], cpu_limits = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], memory_limits = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], hostpath_mounts = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], container_sock_mounts = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], selinux_options = 0 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], hostport_not_used = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], latest_tag = 100 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], log_output = 100 I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: total_passed: ["essential"] = 11 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_max_passed tag: ["essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name specialized_init_system D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name single_process_type D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name zombie_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name sig_term_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name increase_decrease_capacity D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name liveness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name readiness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostport_not_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name node_drain D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name privileged_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name non_root_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name cpu_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name memory_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostpath_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name log_output D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name container_sock_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name selinux_options D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name latest_tag D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: total_max_passed tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: failed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: na I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: failed tests ["non_root_containers"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name service_discovery D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_latency D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_corruption D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_duplication D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_io_stress D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name operator_installed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name secrets_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_configmap D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus Observability and diagnostics results: 1 of 1 tests passed  Microservice Tests D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name no_local_volume_configuration D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name elastic_volumes D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name linux_hardening D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_file_systems D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name ingress_egress_blocked D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name prometheus_traffic D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name open_metrics D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name routed_logs D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name tracing D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: bonus tasks ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: tasks x: specialized_init_system D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_points: task: specialized_init_system is worth: 100 points I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: tasks x: single_process_type D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_points: task: single_process_type is worth: 100 points I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: tasks x: zombie_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_points: task: zombie_handled is worth: 100 points I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: tasks x: sig_term_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_points: task: sig_term_handled is worth: 100 points I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: tasks x: increase_decrease_capacity D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_points: task: increase_decrease_capacity is worth: 100 points I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: tasks x: liveness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_points: task: liveness is worth: 100 points I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: tasks x: readiness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_points: task: readiness is worth: 100 points I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: tasks x: hostport_not_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_points: task: hostport_not_used is worth: 100 points I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: tasks x: hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_points: task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: tasks x: node_drain D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_points: task: node_drain is worth: 100 points I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: tasks x: privileged_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_points: task: privileged_containers is worth: 100 points I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) true D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: tasks x: non_root_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_points: task: non_root_containers is worth: 100 points I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: tasks x: cpu_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_points: task: cpu_limits is worth: 100 points I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: tasks x: memory_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_points: task: memory_limits is worth: 100 points I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: tasks x: hostpath_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_points: task: hostpath_mounts is worth: 100 points I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: tasks x: log_output D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_points: task: log_output is worth: 100 points I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: tasks x: container_sock_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_points: task: container_sock_mounts is worth: 100 points I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, selinux_options = 0 status = na I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: tasks x: selinux_options D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, selinux_options = 0 status = na I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: na_assigned for selinux_options I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: tasks x: latest_tag D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, node_drain = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, privileged_containers = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, non_root_containers = 0 status = failed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, cpu_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, memory_limits = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostpath_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, container_sock_mounts = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, selinux_options = 0 status = na D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostport_not_used = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, latest_tag = 100 status = passed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, log_output = 100 status = passed I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: task_points: task: latest_tag is worth: 100 points I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: total_max_passed: ["essential"] = 18 D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 300, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}]} D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 100, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}]} D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 100, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}]} D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 100, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}], "maximum_points" => 100} D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name reasonable_image_size D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name specialized_init_system D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name reasonable_startup_time D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name single_process_type D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name zombie_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name service_discovery D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name shared_database D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name sig_term_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: ClusterTools install I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.namespaces command: kubectl get namespaces -o json D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.namespaces output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Namespace", "metadata": { "creationTimestamp": "2025-03-06T11:52:37Z", "labels": { "kubernetes.io/metadata.name": "cnf-default", "pod-security.kubernetes.io/enforce": "privileged" }, "name": "cnf-default", "resourceVersion": "4961318", "uid": "103765f6-3249-4db3-8846-dfb26f5ddf19" }, "spec": { "finalizers": [ "kubernetes" ] }, "status": { "phase": "Active" } }, { "apiVersion": "v1", "kind": "Namespace", "metadata": { "creationTimestamp": "2025-03-06T11:52:21Z", "labels": { "kubernetes.io/metadata.name": "cnf-testsuite", "pod-security.kubernetes.io/enforce": "privileged" }, "name": "cnf-testsuite", "resourceVersion": "4961120", "uid": "339d74b5-bae7-4452-9537-637944b57f79" }, "spec": { "finalizers": [ "kubernetes" ] }, "status": { "phase": "Active" } }, { "apiVersion": "v1", "kind": "Namespace", "metadata": { "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "kubernetes.io/metadata.name": "default" }, "name": "default", "resourceVersion": "41", "uid": "582d4c13-470d-46d8-a141-1fe0bacc8254" }, "spec": { "finalizers": [ "kubernetes" ] }, "status": { "phase": "Active" } }, { "apiVersion": "v1", "kind": "Namespace", "metadata": { "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "kubernetes.io/metadata.name": "kube-node-lease" }, "name": "kube-node-lease", "resourceVersion": "65", "uid": "eb770c0e-e101-4c8f-9a8d-46783f79a977" }, "spec": { "finalizers": [ "kubernetes" ] }, "status": { "phase": "Active" } }, { "apiVersion": "v1", "kind": "Namespace", "metadata": { "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "kubernetes.io/metadata.name": "kube-public" }, "name": "kube-public", "resourceVersion": "35", "uid": "5c0fe4a6-8a5e-483c-91c2-5c71550db77b" }, "spec": { "finalizers": [ "kubernetes" ] }, "status": { "phase": "Active" } }, { "apiVersion": "v1", "kind": "Namespace", "metadata": { "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "kubernetes.io/metadata.name": "kube-system" }, "name": "kube-system", "resourceVersion": "12", "uid": "731b18ca-8630-4343-96b2-dcabfb462b9e" }, "spec": { "finalizers": [ "kubernetes" ] }, "status": { "phase": "Active" } }, { "apiVersion": "v1", "kind": "Namespace", "metadata": { "annotations": { "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"litmus\"}}\n" }, "creationTimestamp": "2025-03-06T11:53:11Z", "labels": { "kubernetes.io/metadata.name": "litmus", "pod-security.kubernetes.io/enforce": "privileged" }, "name": "litmus", "resourceVersion": "4961481", "uid": "911f9200-8b9d-4ff7-98c3-6eae2879dbf7" }, "spec": { "finalizers": [ "kubernetes" ] }, "status": { "phase": "Active" } }, { "apiVersion": "v1", "kind": "Namespace", "metadata": { "annotations": { "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"local-path-storage\"}}\n" }, "creationTimestamp": "2025-01-31T08:09:11Z", "labels": { "kubernetes.io/metadata.name": "local-path-storage" }, "name": "local-path-storage", "resourceVersion": "288", "uid": "7b1bef67-ca69-4da8-bec4-7a44649be129" }, "spec": { "finalizers": [ "kubernetes" ] }, "status": { "phase": "Active" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools ensure_namespace_exists namespace_array: [{"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:37Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-default", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-default", "resourceVersion" => "4961318", "uid" => "103765f6-3249-4db3-8846-dfb26f5ddf19"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:21Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-testsuite", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-testsuite", "resourceVersion" => "4961120", "uid" => "339d74b5-bae7-4452-9537-637944b57f79"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:05Z", "labels" => {"kubernetes.io/metadata.name" => "default"}, "name" => "default", "resourceVersion" => "41", "uid" => "582d4c13-470d-46d8-a141-1fe0bacc8254"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:05Z", "labels" => {"kubernetes.io/metadata.name" => "kube-node-lease"}, "name" => "kube-node-lease", "resourceVersion" => "65", "uid" => "eb770c0e-e101-4c8f-9a8d-46783f79a977"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:05Z", "labels" => {"kubernetes.io/metadata.name" => "kube-public"}, "name" => "kube-public", "resourceVersion" => "35", "uid" => "5c0fe4a6-8a5e-483c-91c2-5c71550db77b"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:05Z", "labels" => {"kubernetes.io/metadata.name" => "kube-system"}, "name" => "kube-system", "resourceVersion" => "12", "uid" => "731b18ca-8630-4343-96b2-dcabfb462b9e"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"litmus\"}}\n"}, "creationTimestamp" => "2025-03-06T11:53:11Z", "labels" => {"kubernetes.io/metadata.name" => "litmus", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "litmus", "resourceVersion" => "4961481", "uid" => "911f9200-8b9d-4ff7-98c3-6eae2879dbf7"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"local-path-storage\"}}\n"}, "creationTimestamp" => "2025-01-31T08:09:11Z", "labels" => {"kubernetes.io/metadata.name" => "local-path-storage"}, "name" => "local-path-storage", "resourceVersion" => "288", "uid" => "7b1bef67-ca69-4da8-bec4-7a44649be129"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}] I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Apply.file command: kubectl apply -n cnf-testsuite -f cluster_tools.yml D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Apply.file output: daemonset.apps/cluster-tools unchanged I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: ClusterTools wait_for_cluster_tools I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.namespaces command: kubectl get namespaces -o json D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.namespaces output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Namespace", "metadata": { "creationTimestamp": "2025-03-06T11:52:37Z", "labels": { "kubernetes.io/metadata.name": "cnf-default", "pod-security.kubernetes.io/enforce": "privileged" }, "name": "cnf-default", "resourceVersion": "4961318", "uid": "103765f6-3249-4db3-8846-dfb26f5ddf19" }, "spec": { "finalizers": [ "kubernetes" ] }, "status": { "phase": "Active" } }, { "apiVersion": "v1", "kind": "Namespace", "metadata": { "creationTimestamp": "2025-03-06T11:52:21Z", "labels": { "kubernetes.io/metadata.name": "cnf-testsuite", "pod-security.kubernetes.io/enforce": "privileged" }, "name": "cnf-testsuite", "resourceVersion": "4961120", "uid": "339d74b5-bae7-4452-9537-637944b57f79" }, "spec": { "finalizers": [ "kubernetes" ] }, "status": { "phase": "Active" } }, { "apiVersion": "v1", "kind": "Namespace", "metadata": { "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "kubernetes.io/metadata.name": "default" }, "name": "default", "resourceVersion": "41", "uid": "582d4c13-470d-46d8-a141-1fe0bacc8254" }, "spec": { "finalizers": [ "kubernetes" ] }, "status": { "phase": "Active" } }, { "apiVersion": "v1", "kind": "Namespace", "metadata": { "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "kubernetes.io/metadata.name": "kube-node-lease" }, "name": "kube-node-lease", "resourceVersion": "65", "uid": "eb770c0e-e101-4c8f-9a8d-46783f79a977" }, "spec": { "finalizers": [ "kubernetes" ] }, "status": { "phase": "Active" } }, { "apiVersion": "v1", "kind": "Namespace", "metadata": { "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "kubernetes.io/metadata.name": "kube-public" }, "name": "kube-public", "resourceVersion": "35", "uid": "5c0fe4a6-8a5e-483c-91c2-5c71550db77b" }, "spec": { "finalizers": [ "kubernetes" ] }, "status": { "phase": "Active" } }, { "apiVersion": "v1", "kind": "Namespace", "metadata": { "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "kubernetes.io/metadata.name": "kube-system" }, "name": "kube-system", "resourceVersion": "12", "uid": "731b18ca-8630-4343-96b2-dcabfb462b9e" }, "spec": { "finalizers": [ "kubernetes" ] }, "status": { "phase": "Active" } }, { "apiVersion": "v1", "kind": "Namespace", "metadata": { "annotations": { "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"litmus\"}}\n" }, "creationTimestamp": "2025-03-06T11:53:11Z", "labels": { "kubernetes.io/metadata.name": "litmus", "pod-security.kubernetes.io/enforce": "privileged" }, "name": "litmus", "resourceVersion": "4961481", "uid": "911f9200-8b9d-4ff7-98c3-6eae2879dbf7" }, "spec": { "finalizers": [ "kubernetes" ] }, "status": { "phase": "Active" } }, { "apiVersion": "v1", "kind": "Namespace", "metadata": { "annotations": { "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"local-path-storage\"}}\n" }, "creationTimestamp": "2025-01-31T08:09:11Z", "labels": { "kubernetes.io/metadata.name": "local-path-storage" }, "name": "local-path-storage", "resourceVersion": "288", "uid": "7b1bef67-ca69-4da8-bec4-7a44649be129" }, "spec": { "finalizers": [ "kubernetes" ] }, "status": { "phase": "Active" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:56:48 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools ensure_namespace_exists namespace_array: [{"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:37Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-default", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-default", "resourceVersion" => "4961318", "uid" => "103765f6-3249-4db3-8846-dfb26f5ddf19"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:21Z", "labels" => {"kubernetes.io/metadata.name" => "cnf-testsuite", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "cnf-testsuite", "resourceVersion" => "4961120", "uid" => "339d74b5-bae7-4452-9537-637944b57f79"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:05Z", "labels" => {"kubernetes.io/metadata.name" => "default"}, "name" => "default", "resourceVersion" => "41", "uid" => "582d4c13-470d-46d8-a141-1fe0bacc8254"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:05Z", "labels" => {"kubernetes.io/metadata.name" => "kube-node-lease"}, "name" => "kube-node-lease", "resourceVersion" => "65", "uid" => "eb770c0e-e101-4c8f-9a8d-46783f79a977"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:05Z", "labels" => {"kubernetes.io/metadata.name" => "kube-public"}, "name" => "kube-public", "resourceVersion" => "35", "uid" => "5c0fe4a6-8a5e-483c-91c2-5c71550db77b"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:05Z", "labels" => {"kubernetes.io/metadata.name" => "kube-system"}, "name" => "kube-system", "resourceVersion" => "12", "uid" => "731b18ca-8630-4343-96b2-dcabfb462b9e"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"litmus\"}}\n"}, "creationTimestamp" => "2025-03-06T11:53:11Z", "labels" => {"kubernetes.io/metadata.name" => "litmus", "pod-security.kubernetes.io/enforce" => "privileged"}, "name" => "litmus", "resourceVersion" => "4961481", "uid" => "911f9200-8b9d-4ff7-98c3-6eae2879dbf7"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}, {"apiVersion" => "v1", "kind" => "Namespace", "metadata" => {"annotations" => {"kubectl.kubernetes.io/last-applied-configuration" => "{\"apiVersion\":\"v1\",\"kind\":\"Namespace\",\"metadata\":{\"annotations\":{},\"name\":\"local-path-storage\"}}\n"}, "creationTimestamp" => "2025-01-31T08:09:11Z", "labels" => {"kubernetes.io/metadata.name" => "local-path-storage"}, "name" => "local-path-storage", "resourceVersion" => "288", "uid" => "7b1bef67-ca69-4da8-bec4-7a44649be129"}, "spec" => {"finalizers" => ["kubernetes"]}, "status" => {"phase" => "Active"}}] I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: resource_wait_for_install kind: Daemonset resource_name: cluster-tools namespace: cnf-testsuite kubeconfig: I, [2025-03-06 11:56:48 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Daemonset --namespace=cnf-testsuite cluster-tools -o=jsonpath='{.status.desiredNumberScheduled}' D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 2 I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Daemonset --namespace=cnf-testsuite cluster-tools -o=jsonpath='{.status.numberAvailable}' D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: 2 I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.replica_count command: kubectl get Daemonset --namespace=cnf-testsuite cluster-tools -o=jsonpath='{.status.unavailableReplicas}' D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.replica_count output: I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: current_replicas: 2, desired_replicas: 2 I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: is_ready kind/resource Daemonset, cluster-tools: true I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: task_runner args: # I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: ensure_cnf_installed? true I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: check_cnf_config args: # I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: check_cnf_config cnf: I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [specialized_init_system] I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: CNF configs found: 1 D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: single_task_runner args: # "installed_cnf_files/cnf-testsuite.yml"}> I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite-specialized_init_system: Starting test D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite-specialized_init_system: cnf_config: # I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: cnf_resource_ymls I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: manifest_path_to_ymls file_path: installed_cnf_files/common_manifest.yml I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: manifest_string_to_ymls D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: manifest_string_to_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: cnf_resource_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Deployment D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"} D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Service D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"} D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: {} D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Pod D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ReplicaSet D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: StatefulSet D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: DaemonSet D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ServiceAccount D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: resources: [] D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: all resource: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}} D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}} D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite-KubectlClient::Get.resource_volumes: Deployment resource_name: coredns-coredns namespace: cnf-default I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "litmuschaos.io/chaos": "true", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 4, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4961737", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "availableReplicas": 1, "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 4, "readyReplicas": 1, "replicas": 1, "updatedReplicas": 1 } } I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: kubectl get resource volumes: [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}] D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: kubectl get resource containers kind: Deployment resource_name: coredns-coredns namespace: cnf-default I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "litmuschaos.io/chaos": "true", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 4, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4961737", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "availableReplicas": 1, "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 4, "readyReplicas": 1, "replicas": 1, "updatedReplicas": 1 } } D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: kubectl get resource containers: [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}]}] I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite-specialized_init_system: Checking resource Deployment/coredns-coredns in cnf-default I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "litmuschaos.io/chaos": "true", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 4, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4961737", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "availableReplicas": 1, "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 4, "readyReplicas": 1, "replicas": 1, "updatedReplicas": 1 } } I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: pods_by_resource D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: pods_by_resource resource: {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"annotations" => {"deployment.kubernetes.io/revision" => "1", "litmuschaos.io/chaos" => "true", "meta.helm.sh/release-name" => "coredns", "meta.helm.sh/release-namespace" => "cnf-default"}, "creationTimestamp" => "2025-03-06T11:52:37Z", "generation" => 4, "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/name" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS"}, "name" => "coredns-coredns", "namespace" => "cnf-default", "resourceVersion" => "4961737", "uid" => "489e7e00-25be-4697-9d6f-9e9bc6689c66"}, "spec" => {"progressDeadlineSeconds" => 600, "replicas" => 1, "revisionHistoryLimit" => 10, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"}}, "strategy" => {"rollingUpdate" => {"maxSurge" => "25%", "maxUnavailable" => 1}, "type" => "RollingUpdate"}, "template" => {"metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => nil, "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"}}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}]}], "dnsPolicy" => "Default", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}]}}}, "status" => {"availableReplicas" => 1, "conditions" => [{"lastTransitionTime" => "2025-03-06T11:52:37Z", "lastUpdateTime" => "2025-03-06T11:52:52Z", "message" => "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason" => "NewReplicaSetAvailable", "status" => "True", "type" => "Progressing"}, {"lastTransitionTime" => "2025-03-06T11:53:07Z", "lastUpdateTime" => "2025-03-06T11:53:07Z", "message" => "Deployment has minimum availability.", "reason" => "MinimumReplicasAvailable", "status" => "True", "type" => "Available"}], "observedGeneration" => 4, "readyReplicas" => 1, "replicas" => 1, "updatedReplicas" => 1}} I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: resource kind: Deployment I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:49 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:56:49 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:50 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:56:50 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:50 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:56:50 UTC #1422] DEBUG -- cnf-testsuite: taints: [{"effect" => "NoSchedule", "key" => "node-role.kubernetes.io/control-plane"}] I, [2025-03-06 11:56:50 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:50 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:56:50 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:50 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:56:50 UTC #1422] DEBUG -- cnf-testsuite: taints: I, [2025-03-06 11:56:50 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:50 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:56:50 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:50 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:56:50 UTC #1422] DEBUG -- cnf-testsuite: taints: D, [2025-03-06 11:56:50 UTC #1422] DEBUG -- cnf-testsuite: resource_map items : [{"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker"}, "name" => "v132-worker", "resourceVersion" => "4962054", "uid" => "f5b473ab-dbca-4331-a088-561021e2400f"}, "spec" => {"podCIDR" => "10.244.2.0/24", "podCIDRs" => ["10.244.2.0/24"], "providerID" => "kind://docker/v132/v132-worker"}, "status" => {"addresses" => [{"address" => "172.24.0.9", "type" => "InternalIP"}, {"address" => "v132-worker", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter"], "sizeBytes" => 351519591}, {"names" => ["docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter"], "sizeBytes" => 344304298}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter"], "sizeBytes" => 298627136}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter"], "sizeBytes" => 285504787}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0"], "sizeBytes" => 58057865}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6"], "sizeBytes" => 11555354}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "71e7b586a0c24b35898016e092b898c4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "09103c12-a066-4570-92b0-221c8c39ecb8"}}}, {"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4961618", "uid" => "a499c571-be9e-41e0-a4ea-dc082e96fd5a"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest"], "sizeBytes" => 72080558}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "960341c8-b3a9-4b4a-bb0c-142338daaac6"}}}] D, [2025-03-06 11:56:51 UTC #1422] DEBUG -- cnf-testsuite: nodes: [{"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker"}, "name" => "v132-worker", "resourceVersion" => "4962054", "uid" => "f5b473ab-dbca-4331-a088-561021e2400f"}, "spec" => {"podCIDR" => "10.244.2.0/24", "podCIDRs" => ["10.244.2.0/24"], "providerID" => "kind://docker/v132/v132-worker"}, "status" => {"addresses" => [{"address" => "172.24.0.9", "type" => "InternalIP"}, {"address" => "v132-worker", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter"], "sizeBytes" => 351519591}, {"names" => ["docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter"], "sizeBytes" => 344304298}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter"], "sizeBytes" => 298627136}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter"], "sizeBytes" => 285504787}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0"], "sizeBytes" => 58057865}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6"], "sizeBytes" => 11555354}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "71e7b586a0c24b35898016e092b898c4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "09103c12-a066-4570-92b0-221c8c39ecb8"}}}, {"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4961618", "uid" => "a499c571-be9e-41e0-a4ea-dc082e96fd5a"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest"], "sizeBytes" => 72080558}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "960341c8-b3a9-4b4a-bb0c-142338daaac6"}}}] D, [2025-03-06 11:56:51 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:56:51 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker"} D, [2025-03-06 11:56:51 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker I, [2025-03-06 11:56:51 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:56:51 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:56:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:51 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-mh426", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961311", "uid" => "95aa40ad-9e0e-486b-a5d0-41f9194fd651"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-9vvm7", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-9vvm7", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:35Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:35Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:35Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-9vvm7", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.9", "hostIPs" => [{"ip" => "172.24.0.9"}], "phase" => "Running", "podIP" => "172.24.0.9", "podIPs" => [{"ip" => "172.24.0.9"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:56:51 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-mh426 D, [2025-03-06 11:56:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:51 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-5d7tp", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "604", "uid" => "740809cc-4bf8-40e5-a556-d39f5cf1ff03"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-wpwg9", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-wpwg9", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:41Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:41Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:41Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:40Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-wpwg9", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.9", "hostIPs" => [{"ip" => "172.24.0.9"}], "phase" => "Running", "podIP" => "10.244.2.2", "podIPs" => [{"ip" => "10.244.2.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:56:51 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-5d7tp D, [2025-03-06 11:56:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:51 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-4s8ph", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "509", "uid" => "0f87ae31-f6df-43d6-b42a-0236e849318a"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-5p2rs", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-5p2rs", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:20Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:26Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-5p2rs", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.9", "hostIPs" => [{"ip" => "172.24.0.9"}], "phase" => "Running", "podIP" => "172.24.0.9", "podIPs" => [{"ip" => "172.24.0.9"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:20Z"}} D, [2025-03-06 11:56:51 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-4s8ph D, [2025-03-06 11:56:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:51 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-dkr2j", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "500", "uid" => "14b0603b-2896-496e-84e3-572ff7452828"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-sq7d2", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-sq7d2", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:25Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:20Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:25Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:25Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:24Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-sq7d2", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.9", "hostIPs" => [{"ip" => "172.24.0.9"}], "phase" => "Running", "podIP" => "172.24.0.9", "podIPs" => [{"ip" => "172.24.0.9"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:20Z"}} D, [2025-03-06 11:56:51 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-dkr2j D, [2025-03-06 11:56:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:51 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:56:51 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:56:51 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 I, [2025-03-06 11:56:52 UTC #1422] INFO -- cnf-testsuite: resource kind: Deployment I, [2025-03-06 11:56:52 UTC #1422] INFO -- cnf-testsuite: pods_by_resource name: coredns-coredns D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: resource_labels kind: Deployment resource_name: coredns-coredns I, [2025-03-06 11:56:52 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "litmuschaos.io/chaos": "true", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 4, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4961737", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "availableReplicas": 1, "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 4, "readyReplicas": 1, "replicas": 1, "updatedReplicas": 1 } } D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: resource_labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} I, [2025-03-06 11:56:52 UTC #1422] INFO -- cnf-testsuite: pods_by_resource labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns I, [2025-03-06 11:56:52 UTC #1422] INFO -- cnf-testsuite-specialized_init_system: Pod count for resource Deployment/coredns-coredns in cnf-default: 1 I, [2025-03-06 11:56:52 UTC #1422] INFO -- cnf-testsuite-specialized_init_system: Inspecting pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} I, [2025-03-06 11:56:52 UTC #1422] INFO -- cnf-testsuite: nodes_by_pod pod name: coredns-coredns-64fc886fd4-clwtn I, [2025-03-06 11:56:52 UTC #1422] INFO -- cnf-testsuite: resource_select I, [2025-03-06 11:56:52 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:56:52 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:56:52 UTC #1422] INFO -- cnf-testsuite: nodes size: 3 I, [2025-03-06 11:56:52 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:56:52 UTC #1422] INFO -- cnf-testsuite: nodes : {"apiVersion" => "v1", "items" => [{"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:05Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-control-plane", "kubernetes.io/os" => "linux", "node-role.kubernetes.io/control-plane" => "", "node.kubernetes.io/exclude-from-external-load-balancers" => ""}, "name" => "v132-control-plane", "resourceVersion" => "4961381", "uid" => "e3a8ca14-2d88-4785-a327-522fe918366a"}, "spec" => {"podCIDR" => "10.244.0.0/24", "podCIDRs" => ["10.244.0.0/24"], "providerID" => "kind://docker/v132/v132-control-plane", "taints" => [{"effect" => "NoSchedule", "key" => "node-role.kubernetes.io/control-plane"}]}, "status" => {"addresses" => [{"address" => "172.24.0.10", "type" => "InternalIP"}, {"address" => "v132-control-plane", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:52:51Z", "lastTransitionTime" => "2025-01-31T08:09:03Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:52:51Z", "lastTransitionTime" => "2025-01-31T08:09:03Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:52:51Z", "lastTransitionTime" => "2025-01-31T08:09:03Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:52:51Z", "lastTransitionTime" => "2025-01-31T08:09:29Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0"], "sizeBytes" => 58057865}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6"], "sizeBytes" => 2021226}, {"names" => ["registry.k8s.io/pause:3.10"], "sizeBytes" => 320368}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "c94df63d-d52d-4f3e-a918-e56af4ca2553"}}}, {"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker"}, "name" => "v132-worker", "resourceVersion" => "4962054", "uid" => "f5b473ab-dbca-4331-a088-561021e2400f"}, "spec" => {"podCIDR" => "10.244.2.0/24", "podCIDRs" => ["10.244.2.0/24"], "providerID" => "kind://docker/v132/v132-worker"}, "status" => {"addresses" => [{"address" => "172.24.0.9", "type" => "InternalIP"}, {"address" => "v132-worker", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter"], "sizeBytes" => 351519591}, {"names" => ["docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter"], "sizeBytes" => 344304298}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter"], "sizeBytes" => 298627136}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter"], "sizeBytes" => 285504787}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0"], "sizeBytes" => 58057865}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6"], "sizeBytes" => 11555354}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "71e7b586a0c24b35898016e092b898c4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "09103c12-a066-4570-92b0-221c8c39ecb8"}}}, {"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4961618", "uid" => "a499c571-be9e-41e0-a4ea-dc082e96fd5a"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest"], "sizeBytes" => 72080558}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "960341c8-b3a9-4b4a-bb0c-142338daaac6"}}}], "kind" => "List", "metadata" => {"resourceVersion" => ""}} I, [2025-03-06 11:56:52 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:56:52 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:52 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:56:52 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:56:53 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:56:53 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:56:53 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:56:53 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: resource_map items : [{"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4961618", "uid" => "a499c571-be9e-41e0-a4ea-dc082e96fd5a"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest"], "sizeBytes" => 72080558}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "960341c8-b3a9-4b4a-bb0c-142338daaac6"}}}] D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: nodes: [{"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4961618", "uid" => "a499c571-be9e-41e0-a4ea-dc082e96fd5a"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest"], "sizeBytes" => 72080558}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "960341c8-b3a9-4b4a-bb0c-142338daaac6"}}}] I, [2025-03-06 11:56:53 UTC #1422] INFO -- cnf-testsuite: parse_container_id container_id: containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782 I, [2025-03-06 11:56:53 UTC #1422] INFO -- cnf-testsuite: node_pid_by_container_id container_id: 8ea7a033d5ed83 I, [2025-03-06 11:56:53 UTC #1422] INFO -- cnf-testsuite: parse_container_id container_id: 8ea7a033d5ed83 I, [2025-03-06 11:56:53 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:56:53 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:56:53 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- crictl inspect 8ea7a033d5ed83 I, [2025-03-06 11:56:53 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- crictl inspect 8ea7a033d5ed83 D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: { "status": { "id": "8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "metadata": { "attempt": 0, "name": "coredns" }, "state": "CONTAINER_RUNNING", "createdAt": "2025-03-06T11:53:46.309860166Z", "startedAt": "2025-03-06T11:53:47.994396555Z", "finishedAt": "1970-01-01T00:00:00Z", "exitCode": 0, "image": { "image": "docker.io/coredns/coredns:1.7.1" }, "imageRef": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "reason": "", "message": "", "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "annotations": { "io.kubernetes.container.hash": "30544dd1", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "mounts": [ { "containerPath": "/etc/coredns", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "selinuxRelabel": false }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "selinuxRelabel": false }, { "containerPath": "/etc/hosts", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "selinuxRelabel": false }, { "containerPath": "/dev/termination-log", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "selinuxRelabel": false } ], "logPath": "/var/log/pods/cnf-default_coredns-coredns-64fc886fd4-clwtn_1493bcca-c392-4f42-8125-d050b7590390/coredns/0.log" }, "info": { "sandboxID": "87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299", "pid": 3113417, "removing": false, "snapshotKey": "8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "snapshotter": "overlayfs", "runtimeType": "io.containerd.runc.v2", "runtimeOptions": { "systemd_cgroup": true }, "config": { "metadata": { "name": "coredns" }, "image": { "image": "sha256:0a6cfbf7b0b6606f404f703a3ce24f3f637437b2d06d38008c033c42a2860f5f" }, "args": [ "-conf", "/etc/coredns/Corefile" ], "envs": [ { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "COREDNS_COREDNS_SERVICE_PORT", "value": "53" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_TCP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT", "value": "udp://10.96.24.213:53" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_ADDR", "value": "10.96.24.213" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "COREDNS_COREDNS_SERVICE_HOST", "value": "10.96.24.213" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PROTO", "value": "udp" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PORT", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_TCP", "value": "tcp://10.96.24.213:53" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PORT", "value": "53" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_UDP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP", "value": "udp://10.96.24.213:53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_ADDR", "value": "10.96.24.213" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" } ], "mounts": [ { "container_path": "/etc/coredns", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume", "readonly": true }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8" } ], "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "annotations": { "io.kubernetes.container.hash": "30544dd1", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "log_path": "coredns/0.log", "linux": { "resources": { "cpu_period": 100000, "cpu_quota": 10000, "cpu_shares": 102, "memory_limit_in_bytes": 134217728, "oom_score_adj": -997, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "memory_swap_limit_in_bytes": 134217728 }, "security_context": { "namespace_options": { "pid": 1 }, "run_as_user": {}, "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "seccomp": { "profile_type": 1 } } } }, "runtimeSpec": { "ociVersion": "1.1.0", "process": { "user": { "uid": 0, "gid": 0, "additionalGids": [ 0 ] }, "args": [ "/coredns", "-conf", "/etc/coredns/Corefile" ], "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=coredns-coredns-64fc886fd4-clwtn", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "COREDNS_COREDNS_SERVICE_PORT=53", "COREDNS_COREDNS_SERVICE_PORT_TCP_53=53", "COREDNS_COREDNS_PORT=udp://10.96.24.213:53", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "COREDNS_COREDNS_PORT_53_TCP_ADDR=10.96.24.213", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_PORT=tcp://10.96.0.1:443", "COREDNS_COREDNS_SERVICE_HOST=10.96.24.213", "COREDNS_COREDNS_PORT_53_UDP_PROTO=udp", "COREDNS_COREDNS_PORT_53_UDP_PORT=53", "COREDNS_COREDNS_PORT_53_TCP=tcp://10.96.24.213:53", "COREDNS_COREDNS_PORT_53_TCP_PORT=53", "KUBERNETES_PORT_443_TCP_PORT=443", "COREDNS_COREDNS_SERVICE_PORT_UDP_53=53", "COREDNS_COREDNS_PORT_53_UDP=udp://10.96.24.213:53", "COREDNS_COREDNS_PORT_53_UDP_ADDR=10.96.24.213", "COREDNS_COREDNS_PORT_53_TCP_PROTO=tcp", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_SERVICE_HOST=10.96.0.1" ], "cwd": "/", "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ] }, "oomScoreAdj": -997 }, "root": { "path": "rootfs" }, "mounts": [ { "destination": "/proc", "type": "proc", "source": "proc", "options": [ "nosuid", "noexec", "nodev" ] }, { "destination": "/dev", "type": "tmpfs", "source": "tmpfs", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ] }, { "destination": "/dev/pts", "type": "devpts", "source": "devpts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ] }, { "destination": "/dev/mqueue", "type": "mqueue", "source": "mqueue", "options": [ "nosuid", "noexec", "nodev" ] }, { "destination": "/sys", "type": "sysfs", "source": "sysfs", "options": [ "nosuid", "noexec", "nodev", "ro" ] }, { "destination": "/sys/fs/cgroup", "type": "cgroup", "source": "cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ] }, { "destination": "/etc/coredns", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume", "options": [ "rbind", "rprivate", "ro" ] }, { "destination": "/etc/hosts", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/dev/termination-log", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/etc/hostname", "type": "bind", "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/hostname", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/etc/resolv.conf", "type": "bind", "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/resolv.conf", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/dev/shm", "type": "bind", "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/shm", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz", "options": [ "rbind", "rprivate", "ro" ] } ], "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "annotations": { "io.kubernetes.cri.container-name": "coredns", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "docker.io/coredns/coredns:1.7.1", "io.kubernetes.cri.sandbox-id": "87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299", "io.kubernetes.cri.sandbox-name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.cri.sandbox-namespace": "cnf-default", "io.kubernetes.cri.sandbox-uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "linux": { "resources": { "devices": [ { "allow": false, "access": "rwm" } ], "memory": { "limit": 134217728, "swap": 134217728 }, "cpu": { "shares": 102, "quota": 10000, "period": 100000 } }, "cgroupsPath": "kubelet-kubepods-pod1493bcca_c392_4f42_8125_d050b7590390.slice:cri-containerd:8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "namespaces": [ { "type": "pid" }, { "type": "ipc", "path": "/proc/3113384/ns/ipc" }, { "type": "uts", "path": "/proc/3113384/ns/uts" }, { "type": "mount" }, { "type": "network", "path": "/proc/3113384/ns/net" } ], "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ] } } } } D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "{\n \"status\": {\n \"id\": \"8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"coredns\"\n },\n \"state\": \"CONTAINER_RUNNING\",\n \"createdAt\": \"2025-03-06T11:53:46.309860166Z\",\n \"startedAt\": \"2025-03-06T11:53:47.994396555Z\",\n \"finishedAt\": \"1970-01-01T00:00:00Z\",\n \"exitCode\": 0,\n \"image\": {\n \"image\": \"docker.io/coredns/coredns:1.7.1\"\n },\n \"imageRef\": \"docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef\",\n \"reason\": \"\",\n \"message\": \"\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"coredns\",\n \"io.kubernetes.pod.name\": \"coredns-coredns-64fc886fd4-clwtn\",\n \"io.kubernetes.pod.namespace\": \"cnf-default\",\n \"io.kubernetes.pod.uid\": \"1493bcca-c392-4f42-8125-d050b7590390\"\n },\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"30544dd1\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"udp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"UDP\\\"},{\\\"name\\\":\\\"tcp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/etc/coredns\",\n \"hostPath\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"selinuxRelabel\": false\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"hostPath\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"selinuxRelabel\": false\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"hostPath\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"selinuxRelabel\": false\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"hostPath\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"selinuxRelabel\": false\n }\n ],\n \"logPath\": \"/var/log/pods/cnf-default_coredns-coredns-64fc886fd4-clwtn_1493bcca-c392-4f42-8125-d050b7590390/coredns/0.log\"\n },\n \"info\": {\n \"sandboxID\": \"87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299\",\n \"pid\": 3113417,\n \"removing\": false,\n \"snapshotKey\": \"8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782\",\n \"snapshotter\": \"overlayfs\",\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"config\": {\n \"metadata\": {\n \"name\": \"coredns\"\n },\n \"image\": {\n \"image\": \"sha256:0a6cfbf7b0b6606f404f703a3ce24f3f637437b2d06d38008c033c42a2860f5f\"\n },\n \"args\": [\n \"-conf\",\n \"/etc/coredns/Corefile\"\n ],\n \"envs\": [\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT_TCP_53\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT\",\n \"value\": \"udp://10.96.24.213:53\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_ADDR\",\n \"value\": \"10.96.24.213\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_HOST\",\n \"value\": \"10.96.24.213\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_PROTO\",\n \"value\": \"udp\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP\",\n \"value\": \"tcp://10.96.24.213:53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT_UDP_53\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP\",\n \"value\": \"udp://10.96.24.213:53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_ADDR\",\n \"value\": \"10.96.24.213\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n }\n ],\n \"mounts\": [\n {\n \"container_path\": \"/etc/coredns\",\n \"host_path\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8\"\n }\n ],\n \"labels\": {\n \"io.kubernetes.container.name\": \"coredns\",\n \"io.kubernetes.pod.name\": \"coredns-coredns-64fc886fd4-clwtn\",\n \"io.kubernetes.pod.namespace\": \"cnf-default\",\n \"io.kubernetes.pod.uid\": \"1493bcca-c392-4f42-8125-d050b7590390\"\n },\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"30544dd1\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"udp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"UDP\\\"},{\\\"name\\\":\\\"tcp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"log_path\": \"coredns/0.log\",\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_quota\": 10000,\n \"cpu_shares\": 102,\n \"memory_limit_in_bytes\": 134217728,\n \"oom_score_adj\": -997,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"memory_swap_limit_in_bytes\": 134217728\n },\n \"security_context\": {\n \"namespace_options\": {\n \"pid\": 1\n },\n \"run_as_user\": {},\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"seccomp\": {\n \"profile_type\": 1\n }\n }\n }\n },\n \"runtimeSpec\": {\n \"ociVersion\": \"1.1.0\",\n \"process\": {\n \"user\": {\n \"uid\": 0,\n \"gid\": 0,\n \"additionalGids\": [\n 0\n ]\n },\n \"args\": [\n \"/coredns\",\n \"-conf\",\n \"/etc/coredns/Corefile\"\n ],\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=coredns-coredns-64fc886fd4-clwtn\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"COREDNS_COREDNS_SERVICE_PORT=53\",\n \"COREDNS_COREDNS_SERVICE_PORT_TCP_53=53\",\n \"COREDNS_COREDNS_PORT=udp://10.96.24.213:53\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"COREDNS_COREDNS_PORT_53_TCP_ADDR=10.96.24.213\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"COREDNS_COREDNS_SERVICE_HOST=10.96.24.213\",\n \"COREDNS_COREDNS_PORT_53_UDP_PROTO=udp\",\n \"COREDNS_COREDNS_PORT_53_UDP_PORT=53\",\n \"COREDNS_COREDNS_PORT_53_TCP=tcp://10.96.24.213:53\",\n \"COREDNS_COREDNS_PORT_53_TCP_PORT=53\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"COREDNS_COREDNS_SERVICE_PORT_UDP_53=53\",\n \"COREDNS_COREDNS_PORT_53_UDP=udp://10.96.24.213:53\",\n \"COREDNS_COREDNS_PORT_53_UDP_ADDR=10.96.24.213\",\n \"COREDNS_COREDNS_PORT_53_TCP_PROTO=tcp\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\"\n ],\n \"cwd\": \"/\",\n \"capabilities\": {\n \"bounding\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ],\n \"effective\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ],\n \"permitted\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ]\n },\n \"oomScoreAdj\": -997\n },\n \"root\": {\n \"path\": \"rootfs\"\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"type\": \"proc\",\n \"source\": \"proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ]\n },\n {\n \"destination\": \"/dev\",\n \"type\": \"tmpfs\",\n \"source\": \"tmpfs\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ]\n },\n {\n \"destination\": \"/dev/pts\",\n \"type\": \"devpts\",\n \"source\": \"devpts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ]\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"type\": \"mqueue\",\n \"source\": \"mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ]\n },\n {\n \"destination\": \"/sys\",\n \"type\": \"sysfs\",\n \"source\": \"sysfs\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"ro\"\n ]\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"type\": \"cgroup\",\n \"source\": \"cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"ro\"\n ]\n },\n {\n \"destination\": \"/etc/coredns\",\n \"type\": \"bind\",\n \"source\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ]\n },\n {\n \"destination\": \"/etc/hosts\",\n \"type\": \"bind\",\n \"source\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ]\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"type\": \"bind\",\n \"source\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ]\n },\n {\n \"destination\": \"/etc/hostname\",\n \"type\": \"bind\",\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ]\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"type\": \"bind\",\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ]\n },\n {\n \"destination\": \"/dev/shm\",\n \"type\": \"bind\",\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ]\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"type\": \"bind\",\n \"source\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ]\n }\n ],\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"coredns\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"docker.io/coredns/coredns:1.7.1\",\n \"io.kubernetes.cri.sandbox-id\": \"87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299\",\n \"io.kubernetes.cri.sandbox-name\": \"coredns-coredns-64fc886fd4-clwtn\",\n \"io.kubernetes.cri.sandbox-namespace\": \"cnf-default\",\n \"io.kubernetes.cri.sandbox-uid\": \"1493bcca-c392-4f42-8125-d050b7590390\"\n },\n \"linux\": {\n \"resources\": {\n \"devices\": [\n {\n \"allow\": false,\n \"access\": \"rwm\"\n }\n ],\n \"memory\": {\n \"limit\": 134217728,\n \"swap\": 134217728\n },\n \"cpu\": {\n \"shares\": 102,\n \"quota\": 10000,\n \"period\": 100000\n }\n },\n \"cgroupsPath\": \"kubelet-kubepods-pod1493bcca_c392_4f42_8125_d050b7590390.slice:cri-containerd:8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782\",\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"type\": \"ipc\",\n \"path\": \"/proc/3113384/ns/ipc\"\n },\n {\n \"type\": \"uts\",\n \"path\": \"/proc/3113384/ns/uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"type\": \"network\",\n \"path\": \"/proc/3113384/ns/net\"\n }\n ],\n \"maskedPaths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"readonlyPaths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ]\n }\n }\n }\n}\n", error: ""} D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: node_pid_by_container_id inspect: { "status": { "id": "8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "metadata": { "attempt": 0, "name": "coredns" }, "state": "CONTAINER_RUNNING", "createdAt": "2025-03-06T11:53:46.309860166Z", "startedAt": "2025-03-06T11:53:47.994396555Z", "finishedAt": "1970-01-01T00:00:00Z", "exitCode": 0, "image": { "image": "docker.io/coredns/coredns:1.7.1" }, "imageRef": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "reason": "", "message": "", "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "annotations": { "io.kubernetes.container.hash": "30544dd1", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "mounts": [ { "containerPath": "/etc/coredns", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "selinuxRelabel": false }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "selinuxRelabel": false }, { "containerPath": "/etc/hosts", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "selinuxRelabel": false }, { "containerPath": "/dev/termination-log", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "selinuxRelabel": false } ], "logPath": "/var/log/pods/cnf-default_coredns-coredns-64fc886fd4-clwtn_1493bcca-c392-4f42-8125-d050b7590390/coredns/0.log" }, "info": { "sandboxID": "87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299", "pid": 3113417, "removing": false, "snapshotKey": "8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "snapshotter": "overlayfs", "runtimeType": "io.containerd.runc.v2", "runtimeOptions": { "systemd_cgroup": true }, "config": { "metadata": { "name": "coredns" }, "image": { "image": "sha256:0a6cfbf7b0b6606f404f703a3ce24f3f637437b2d06d38008c033c42a2860f5f" }, "args": [ "-conf", "/etc/coredns/Corefile" ], "envs": [ { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "COREDNS_COREDNS_SERVICE_PORT", "value": "53" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_TCP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT", "value": "udp://10.96.24.213:53" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_ADDR", "value": "10.96.24.213" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "COREDNS_COREDNS_SERVICE_HOST", "value": "10.96.24.213" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PROTO", "value": "udp" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PORT", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_TCP", "value": "tcp://10.96.24.213:53" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PORT", "value": "53" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_UDP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP", "value": "udp://10.96.24.213:53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_ADDR", "value": "10.96.24.213" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" } ], "mounts": [ { "container_path": "/etc/coredns", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume", "readonly": true }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8" } ], "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "annotations": { "io.kubernetes.container.hash": "30544dd1", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "log_path": "coredns/0.log", "linux": { "resources": { "cpu_period": 100000, "cpu_quota": 10000, "cpu_shares": 102, "memory_limit_in_bytes": 134217728, "oom_score_adj": -997, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "memory_swap_limit_in_bytes": 134217728 }, "security_context": { "namespace_options": { "pid": 1 }, "run_as_user": {}, "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "seccomp": { "profile_type": 1 } } } }, "runtimeSpec": { "ociVersion": "1.1.0", "process": { "user": { "uid": 0, "gid": 0, "additionalGids": [ 0 ] }, "args": [ "/coredns", "-conf", "/etc/coredns/Corefile" ], "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=coredns-coredns-64fc886fd4-clwtn", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "COREDNS_COREDNS_SERVICE_PORT=53", "COREDNS_COREDNS_SERVICE_PORT_TCP_53=53", "COREDNS_COREDNS_PORT=udp://10.96.24.213:53", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "COREDNS_COREDNS_PORT_53_TCP_ADDR=10.96.24.213", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_PORT=tcp://10.96.0.1:443", "COREDNS_COREDNS_SERVICE_HOST=10.96.24.213", "COREDNS_COREDNS_PORT_53_UDP_PROTO=udp", "COREDNS_COREDNS_PORT_53_UDP_PORT=53", "COREDNS_COREDNS_PORT_53_TCP=tcp://10.96.24.213:53", "COREDNS_COREDNS_PORT_53_TCP_PORT=53", "KUBERNETES_PORT_443_TCP_PORT=443", "COREDNS_COREDNS_SERVICE_PORT_UDP_53=53", "COREDNS_COREDNS_PORT_53_UDP=udp://10.96.24.213:53", "COREDNS_COREDNS_PORT_53_UDP_ADDR=10.96.24.213", "COREDNS_COREDNS_PORT_53_TCP_PROTO=tcp", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_SERVICE_HOST=10.96.0.1" ], "cwd": "/", "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ] }, "oomScoreAdj": -997 }, "root": { "path": "rootfs" }, "mounts": [ { "destination": "/proc", "type": "proc", "source": "proc", "options": [ "nosuid", "noexec", "nodev" ] }, { "destination": "/dev", "type": "tmpfs", "source": "tmpfs", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ] }, { "destination": "/dev/pts", "type": "devpts", "source": "devpts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ] }, { "destination": "/dev/mqueue", "type": "mqueue", "source": "mqueue", "options": [ "nosuid", "noexec", "nodev" ] }, { "destination": "/sys", "type": "sysfs", "source": "sysfs", "options": [ "nosuid", "noexec", "nodev", "ro" ] }, { "destination": "/sys/fs/cgroup", "type": "cgroup", "source": "cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ] }, { "destination": "/etc/coredns", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume", "options": [ "rbind", "rprivate", "ro" ] }, { "destination": "/etc/hosts", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/dev/termination-log", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/etc/hostname", "type": "bind", "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/hostname", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/etc/resolv.conf", "type": "bind", "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/resolv.conf", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/dev/shm", "type": "bind", "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/shm", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz", "options": [ "rbind", "rprivate", "ro" ] } ], "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "annotations": { "io.kubernetes.cri.container-name": "coredns", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "docker.io/coredns/coredns:1.7.1", "io.kubernetes.cri.sandbox-id": "87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299", "io.kubernetes.cri.sandbox-name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.cri.sandbox-namespace": "cnf-default", "io.kubernetes.cri.sandbox-uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "linux": { "resources": { "devices": [ { "allow": false, "access": "rwm" } ], "memory": { "limit": 134217728, "swap": 134217728 }, "cpu": { "shares": 102, "quota": 10000, "period": 100000 } }, "cgroupsPath": "kubelet-kubepods-pod1493bcca_c392_4f42_8125_d050b7590390.slice:cri-containerd:8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "namespaces": [ { "type": "pid" }, { "type": "ipc", "path": "/proc/3113384/ns/ipc" }, { "type": "uts", "path": "/proc/3113384/ns/uts" }, { "type": "mount" }, { "type": "network", "path": "/proc/3113384/ns/net" } ], "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ] } } } } I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: node_pid_by_container_id pid: 3113417 I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: cmdline_by_pid I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3113417/cmdline I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3113417/cmdline pod/coredns-coredns-64fc886fd4-clwtn has container 'coredns' with /coredns as init process ✖️ 🏆FAILED: [specialized_init_system] Containers do not use specialized init systems (ভ_ভ) ރ 🚀 D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: /coredns-conf/etc/coredns/Corefile D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000", error: ""} I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: cmdline_by_node cmdline: {status: Process::Status[0], output: "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000", error: ""} I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite-InitSystems.scan: pod/coredns-coredns-64fc886fd4-clwtn has container 'coredns' with /coredns as init process I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite-specialized_init_system: Pod scan result: [InitSystems::InitSystemInfo(@kind="pod", @namespace="cnf-default", @name="coredns-coredns-64fc886fd4-clwtn", @container="coredns", @init_cmd="/coredns")] D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: yield resp: I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite-KubectlClient::Get.resource_volumes: Service resource_name: coredns-coredns namespace: cnf-default D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: workload resource test intialized: true test_passed: true D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: task specialized_init_system emoji: 🚀 I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "specialized_init_system", "emoji" => "🚀", "tags" => ["microservice", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["microservice", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: resp: ["microservice", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: task_type x: microservice acc: I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: cmd: /usr/local/bin/cnf-testsuite cert I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite-specialized_init_system: task_runtime=00:00:05.347037753; start_time=2025-03-06 11:56:49 UTC; end_time:2025-03-06 11:56:54 UTC I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "specialized_init_system", "emoji" => "🚀", "tags" => ["microservice", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["microservice", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: resp: ["microservice", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: task_type x: microservice acc: I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: upsert_task: task: specialized_init_system has status: failed and is awarded: 0 points. Runtime: 00:00:05.347037753 I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: task_runner args: # I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: ensure_cnf_installed? true I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: check_cnf_config args: # I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: check_cnf_config cnf: I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [single_process_type] I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: CNF configs found: 1 D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: single_task_runner args: # "installed_cnf_files/cnf-testsuite.yml"}> I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite-single_process_type: Starting test D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite-single_process_type: cnf_config: # I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: cnf_resource_ymls I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: manifest_path_to_ymls file_path: installed_cnf_files/common_manifest.yml I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: manifest_string_to_ymls D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: manifest_string_to_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: cnf_resource_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Deployment D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"} D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Service D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"} D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: {} D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Pod D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ReplicaSet D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: StatefulSet D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: DaemonSet D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ServiceAccount D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: resources: [] D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: all resource: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: Constructed resource_named_tuple: {kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"} I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "litmuschaos.io/chaos": "true", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 4, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4961737", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "availableReplicas": 1, "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 4, "readyReplicas": 1, "replicas": 1, "updatedReplicas": 1 } } I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: pods_by_resource D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: pods_by_resource resource: {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"annotations" => {"deployment.kubernetes.io/revision" => "1", "litmuschaos.io/chaos" => "true", "meta.helm.sh/release-name" => "coredns", "meta.helm.sh/release-namespace" => "cnf-default"}, "creationTimestamp" => "2025-03-06T11:52:37Z", "generation" => 4, "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/name" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS"}, "name" => "coredns-coredns", "namespace" => "cnf-default", "resourceVersion" => "4961737", "uid" => "489e7e00-25be-4697-9d6f-9e9bc6689c66"}, "spec" => {"progressDeadlineSeconds" => 600, "replicas" => 1, "revisionHistoryLimit" => 10, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"}}, "strategy" => {"rollingUpdate" => {"maxSurge" => "25%", "maxUnavailable" => 1}, "type" => "RollingUpdate"}, "template" => {"metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => nil, "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"}}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}]}], "dnsPolicy" => "Default", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}]}}}, "status" => {"availableReplicas" => 1, "conditions" => [{"lastTransitionTime" => "2025-03-06T11:52:37Z", "lastUpdateTime" => "2025-03-06T11:52:52Z", "message" => "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason" => "NewReplicaSetAvailable", "status" => "True", "type" => "Progressing"}, {"lastTransitionTime" => "2025-03-06T11:53:07Z", "lastUpdateTime" => "2025-03-06T11:53:07Z", "message" => "Deployment has minimum availability.", "reason" => "MinimumReplicasAvailable", "status" => "True", "type" => "Available"}], "observedGeneration" => 4, "readyReplicas" => 1, "replicas" => 1, "updatedReplicas" => 1}} I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: resource kind: Deployment I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:54 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:56:54 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:55 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:56:55 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:55 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:56:55 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:55 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:56:55 UTC #1422] DEBUG -- cnf-testsuite: taints: [{"effect" => "NoSchedule", "key" => "node-role.kubernetes.io/control-plane"}] I, [2025-03-06 11:56:55 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:55 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:56:55 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:55 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:56:55 UTC #1422] DEBUG -- cnf-testsuite: taints: I, [2025-03-06 11:56:55 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:55 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:56:55 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:55 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:56:55 UTC #1422] DEBUG -- cnf-testsuite: taints: D, [2025-03-06 11:56:55 UTC #1422] DEBUG -- cnf-testsuite: resource_map items : [{"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker"}, "name" => "v132-worker", "resourceVersion" => "4962054", "uid" => "f5b473ab-dbca-4331-a088-561021e2400f"}, "spec" => {"podCIDR" => "10.244.2.0/24", "podCIDRs" => ["10.244.2.0/24"], "providerID" => "kind://docker/v132/v132-worker"}, "status" => {"addresses" => [{"address" => "172.24.0.9", "type" => "InternalIP"}, {"address" => "v132-worker", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter"], "sizeBytes" => 351519591}, {"names" => ["docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter"], "sizeBytes" => 344304298}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter"], "sizeBytes" => 298627136}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter"], "sizeBytes" => 285504787}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0"], "sizeBytes" => 58057865}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6"], "sizeBytes" => 11555354}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "71e7b586a0c24b35898016e092b898c4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "09103c12-a066-4570-92b0-221c8c39ecb8"}}}, {"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4961618", "uid" => "a499c571-be9e-41e0-a4ea-dc082e96fd5a"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest"], "sizeBytes" => 72080558}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "960341c8-b3a9-4b4a-bb0c-142338daaac6"}}}] D, [2025-03-06 11:56:56 UTC #1422] DEBUG -- cnf-testsuite: nodes: [{"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker"}, "name" => "v132-worker", "resourceVersion" => "4962054", "uid" => "f5b473ab-dbca-4331-a088-561021e2400f"}, "spec" => {"podCIDR" => "10.244.2.0/24", "podCIDRs" => ["10.244.2.0/24"], "providerID" => "kind://docker/v132/v132-worker"}, "status" => {"addresses" => [{"address" => "172.24.0.9", "type" => "InternalIP"}, {"address" => "v132-worker", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter"], "sizeBytes" => 351519591}, {"names" => ["docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter"], "sizeBytes" => 344304298}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter"], "sizeBytes" => 298627136}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter"], "sizeBytes" => 285504787}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0"], "sizeBytes" => 58057865}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6"], "sizeBytes" => 11555354}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "71e7b586a0c24b35898016e092b898c4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "09103c12-a066-4570-92b0-221c8c39ecb8"}}}, {"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4961618", "uid" => "a499c571-be9e-41e0-a4ea-dc082e96fd5a"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest"], "sizeBytes" => 72080558}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "960341c8-b3a9-4b4a-bb0c-142338daaac6"}}}] D, [2025-03-06 11:56:56 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:56:56 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker"} D, [2025-03-06 11:56:56 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker I, [2025-03-06 11:56:56 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-mh426", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961311", "uid" => "95aa40ad-9e0e-486b-a5d0-41f9194fd651"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-9vvm7", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-9vvm7", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:35Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:35Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:35Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-9vvm7", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.9", "hostIPs" => [{"ip" => "172.24.0.9"}], "phase" => "Running", "podIP" => "172.24.0.9", "podIPs" => [{"ip" => "172.24.0.9"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-mh426 D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-5d7tp", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "604", "uid" => "740809cc-4bf8-40e5-a556-d39f5cf1ff03"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-wpwg9", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-wpwg9", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:41Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:41Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:41Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:40Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-wpwg9", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.9", "hostIPs" => [{"ip" => "172.24.0.9"}], "phase" => "Running", "podIP" => "10.244.2.2", "podIPs" => [{"ip" => "10.244.2.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-5d7tp D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-4s8ph", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "509", "uid" => "0f87ae31-f6df-43d6-b42a-0236e849318a"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-5p2rs", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-5p2rs", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:20Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:26Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-5p2rs", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.9", "hostIPs" => [{"ip" => "172.24.0.9"}], "phase" => "Running", "podIP" => "172.24.0.9", "podIPs" => [{"ip" => "172.24.0.9"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:20Z"}} D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-4s8ph D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-dkr2j", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "500", "uid" => "14b0603b-2896-496e-84e3-572ff7452828"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-sq7d2", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-sq7d2", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:25Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:20Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:25Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:25Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:24Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-sq7d2", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.9", "hostIPs" => [{"ip" => "172.24.0.9"}], "phase" => "Running", "podIP" => "172.24.0.9", "podIPs" => [{"ip" => "172.24.0.9"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:20Z"}} D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-dkr2j D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:56:57 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 I, [2025-03-06 11:56:57 UTC #1422] INFO -- cnf-testsuite: resource kind: Deployment I, [2025-03-06 11:56:57 UTC #1422] INFO -- cnf-testsuite: pods_by_resource name: coredns-coredns D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: resource_labels kind: Deployment resource_name: coredns-coredns I, [2025-03-06 11:56:57 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "litmuschaos.io/chaos": "true", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 4, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4961737", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "availableReplicas": 1, "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 4, "readyReplicas": 1, "replicas": 1, "updatedReplicas": 1 } } D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: resource_labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} I, [2025-03-06 11:56:57 UTC #1422] INFO -- cnf-testsuite: pods_by_resource labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns I, [2025-03-06 11:56:57 UTC #1422] INFO -- cnf-testsuite: pod_name: coredns-coredns-64fc886fd4-clwtn I, [2025-03-06 11:56:57 UTC #1422] INFO -- cnf-testsuite: container_statuses: [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] I, [2025-03-06 11:56:57 UTC #1422] INFO -- cnf-testsuite: pod_name: coredns-coredns-64fc886fd4-clwtn I, [2025-03-06 11:56:57 UTC #1422] INFO -- cnf-testsuite: nodes_by_pod pod name: coredns-coredns-64fc886fd4-clwtn I, [2025-03-06 11:56:57 UTC #1422] INFO -- cnf-testsuite: resource_select I, [2025-03-06 11:56:57 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:56:57 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:56:57 UTC #1422] INFO -- cnf-testsuite: nodes size: 3 I, [2025-03-06 11:56:57 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:56:57 UTC #1422] INFO -- cnf-testsuite: nodes : {"apiVersion" => "v1", "items" => [{"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:05Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-control-plane", "kubernetes.io/os" => "linux", "node-role.kubernetes.io/control-plane" => "", "node.kubernetes.io/exclude-from-external-load-balancers" => ""}, "name" => "v132-control-plane", "resourceVersion" => "4961381", "uid" => "e3a8ca14-2d88-4785-a327-522fe918366a"}, "spec" => {"podCIDR" => "10.244.0.0/24", "podCIDRs" => ["10.244.0.0/24"], "providerID" => "kind://docker/v132/v132-control-plane", "taints" => [{"effect" => "NoSchedule", "key" => "node-role.kubernetes.io/control-plane"}]}, "status" => {"addresses" => [{"address" => "172.24.0.10", "type" => "InternalIP"}, {"address" => "v132-control-plane", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:52:51Z", "lastTransitionTime" => "2025-01-31T08:09:03Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:52:51Z", "lastTransitionTime" => "2025-01-31T08:09:03Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:52:51Z", "lastTransitionTime" => "2025-01-31T08:09:03Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:52:51Z", "lastTransitionTime" => "2025-01-31T08:09:29Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0"], "sizeBytes" => 58057865}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6"], "sizeBytes" => 2021226}, {"names" => ["registry.k8s.io/pause:3.10"], "sizeBytes" => 320368}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "c94df63d-d52d-4f3e-a918-e56af4ca2553"}}}, {"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker"}, "name" => "v132-worker", "resourceVersion" => "4962054", "uid" => "f5b473ab-dbca-4331-a088-561021e2400f"}, "spec" => {"podCIDR" => "10.244.2.0/24", "podCIDRs" => ["10.244.2.0/24"], "providerID" => "kind://docker/v132/v132-worker"}, "status" => {"addresses" => [{"address" => "172.24.0.9", "type" => "InternalIP"}, {"address" => "v132-worker", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter"], "sizeBytes" => 351519591}, {"names" => ["docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter"], "sizeBytes" => 344304298}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter"], "sizeBytes" => 298627136}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter"], "sizeBytes" => 285504787}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0"], "sizeBytes" => 58057865}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6"], "sizeBytes" => 11555354}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "71e7b586a0c24b35898016e092b898c4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "09103c12-a066-4570-92b0-221c8c39ecb8"}}}, {"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4961618", "uid" => "a499c571-be9e-41e0-a4ea-dc082e96fd5a"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest"], "sizeBytes" => 72080558}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "960341c8-b3a9-4b4a-bb0c-142338daaac6"}}}], "kind" => "List", "metadata" => {"resourceVersion" => ""}} I, [2025-03-06 11:56:57 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:57 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:56:57 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:56:58 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:56:58 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:56:58 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:56:58 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:56:58 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: resource_map items : [{"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4961618", "uid" => "a499c571-be9e-41e0-a4ea-dc082e96fd5a"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest"], "sizeBytes" => 72080558}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "960341c8-b3a9-4b4a-bb0c-142338daaac6"}}}] D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: nodes: [{"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4961618", "uid" => "a499c571-be9e-41e0-a4ea-dc082e96fd5a"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest"], "sizeBytes" => 72080558}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "960341c8-b3a9-4b4a-bb0c-142338daaac6"}}}] I, [2025-03-06 11:56:58 UTC #1422] INFO -- cnf-testsuite: nodes_by_resource done I, [2025-03-06 11:56:58 UTC #1422] INFO -- cnf-testsuite: before ready containerStatuses container_id 8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782 I, [2025-03-06 11:56:58 UTC #1422] INFO -- cnf-testsuite: containerStatuses container_id 8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782 I, [2025-03-06 11:56:58 UTC #1422] INFO -- cnf-testsuite: node_pid_by_container_id container_id: 8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782 I, [2025-03-06 11:56:58 UTC #1422] INFO -- cnf-testsuite: parse_container_id container_id: 8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782 I, [2025-03-06 11:56:58 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:56:58 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:56:58 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- crictl inspect 8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782 I, [2025-03-06 11:56:58 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- crictl inspect 8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: { "status": { "id": "8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "metadata": { "attempt": 0, "name": "coredns" }, "state": "CONTAINER_RUNNING", "createdAt": "2025-03-06T11:53:46.309860166Z", "startedAt": "2025-03-06T11:53:47.994396555Z", "finishedAt": "1970-01-01T00:00:00Z", "exitCode": 0, "image": { "image": "docker.io/coredns/coredns:1.7.1" }, "imageRef": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "reason": "", "message": "", "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "annotations": { "io.kubernetes.container.hash": "30544dd1", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "mounts": [ { "containerPath": "/etc/coredns", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "selinuxRelabel": false }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "selinuxRelabel": false }, { "containerPath": "/etc/hosts", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "selinuxRelabel": false }, { "containerPath": "/dev/termination-log", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "selinuxRelabel": false } ], "logPath": "/var/log/pods/cnf-default_coredns-coredns-64fc886fd4-clwtn_1493bcca-c392-4f42-8125-d050b7590390/coredns/0.log" }, "info": { "sandboxID": "87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299", "pid": 3113417, "removing": false, "snapshotKey": "8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "snapshotter": "overlayfs", "runtimeType": "io.containerd.runc.v2", "runtimeOptions": { "systemd_cgroup": true }, "config": { "metadata": { "name": "coredns" }, "image": { "image": "sha256:0a6cfbf7b0b6606f404f703a3ce24f3f637437b2d06d38008c033c42a2860f5f" }, "args": [ "-conf", "/etc/coredns/Corefile" ], "envs": [ { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "COREDNS_COREDNS_SERVICE_PORT", "value": "53" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_TCP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT", "value": "udp://10.96.24.213:53" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_ADDR", "value": "10.96.24.213" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "COREDNS_COREDNS_SERVICE_HOST", "value": "10.96.24.213" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PROTO", "value": "udp" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PORT", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_TCP", "value": "tcp://10.96.24.213:53" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PORT", "value": "53" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_UDP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP", "value": "udp://10.96.24.213:53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_ADDR", "value": "10.96.24.213" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" } ], "mounts": [ { "container_path": "/etc/coredns", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume", "readonly": true }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8" } ], "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "annotations": { "io.kubernetes.container.hash": "30544dd1", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "log_path": "coredns/0.log", "linux": { "resources": { "cpu_period": 100000, "cpu_quota": 10000, "cpu_shares": 102, "memory_limit_in_bytes": 134217728, "oom_score_adj": -997, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "memory_swap_limit_in_bytes": 134217728 }, "security_context": { "namespace_options": { "pid": 1 }, "run_as_user": {}, "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "seccomp": { "profile_type": 1 } } } }, "runtimeSpec": { "ociVersion": "1.1.0", "process": { "user": { "uid": 0, "gid": 0, "additionalGids": [ 0 ] }, "args": [ "/coredns", "-conf", "/etc/coredns/Corefile" ], "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=coredns-coredns-64fc886fd4-clwtn", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "COREDNS_COREDNS_SERVICE_PORT=53", "COREDNS_COREDNS_SERVICE_PORT_TCP_53=53", "COREDNS_COREDNS_PORT=udp://10.96.24.213:53", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "COREDNS_COREDNS_PORT_53_TCP_ADDR=10.96.24.213", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_PORT=tcp://10.96.0.1:443", "COREDNS_COREDNS_SERVICE_HOST=10.96.24.213", "COREDNS_COREDNS_PORT_53_UDP_PROTO=udp", "COREDNS_COREDNS_PORT_53_UDP_PORT=53", "COREDNS_COREDNS_PORT_53_TCP=tcp://10.96.24.213:53", "COREDNS_COREDNS_PORT_53_TCP_PORT=53", "KUBERNETES_PORT_443_TCP_PORT=443", "COREDNS_COREDNS_SERVICE_PORT_UDP_53=53", "COREDNS_COREDNS_PORT_53_UDP=udp://10.96.24.213:53", "COREDNS_COREDNS_PORT_53_UDP_ADDR=10.96.24.213", "COREDNS_COREDNS_PORT_53_TCP_PROTO=tcp", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_SERVICE_HOST=10.96.0.1" ], "cwd": "/", "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ] }, "oomScoreAdj": -997 }, "root": { "path": "rootfs" }, "mounts": [ { "destination": "/proc", "type": "proc", "source": "proc", "options": [ "nosuid", "noexec", "nodev" ] }, { "destination": "/dev", "type": "tmpfs", "source": "tmpfs", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ] }, { "destination": "/dev/pts", "type": "devpts", "source": "devpts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ] }, { "destination": "/dev/mqueue", "type": "mqueue", "source": "mqueue", "options": [ "nosuid", "noexec", "nodev" ] }, { "destination": "/sys", "type": "sysfs", "source": "sysfs", "options": [ "nosuid", "noexec", "nodev", "ro" ] }, { "destination": "/sys/fs/cgroup", "type": "cgroup", "source": "cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ] }, { "destination": "/etc/coredns", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume", "options": [ "rbind", "rprivate", "ro" ] }, { "destination": "/etc/hosts", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/dev/termination-log", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/etc/hostname", "type": "bind", "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/hostname", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/etc/resolv.conf", "type": "bind", "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/resolv.conf", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/dev/shm", "type": "bind", "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/shm", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz", "options": [ "rbind", "rprivate", "ro" ] } ], "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "annotations": { "io.kubernetes.cri.container-name": "coredns", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "docker.io/coredns/coredns:1.7.1", "io.kubernetes.cri.sandbox-id": "87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299", "io.kubernetes.cri.sandbox-name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.cri.sandbox-namespace": "cnf-default", "io.kubernetes.cri.sandbox-uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "linux": { "resources": { "devices": [ { "allow": false, "access": "rwm" } ], "memory": { "limit": 134217728, "swap": 134217728 }, "cpu": { "shares": 102, "quota": 10000, "period": 100000 } }, "cgroupsPath": "kubelet-kubepods-pod1493bcca_c392_4f42_8125_d050b7590390.slice:cri-containerd:8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "namespaces": [ { "type": "pid" }, { "type": "ipc", "path": "/proc/3113384/ns/ipc" }, { "type": "uts", "path": "/proc/3113384/ns/uts" }, { "type": "mount" }, { "type": "network", "path": "/proc/3113384/ns/net" } ], "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ] } } } } D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "{\n \"status\": {\n \"id\": \"8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"coredns\"\n },\n \"state\": \"CONTAINER_RUNNING\",\n \"createdAt\": \"2025-03-06T11:53:46.309860166Z\",\n \"startedAt\": \"2025-03-06T11:53:47.994396555Z\",\n \"finishedAt\": \"1970-01-01T00:00:00Z\",\n \"exitCode\": 0,\n \"image\": {\n \"image\": \"docker.io/coredns/coredns:1.7.1\"\n },\n \"imageRef\": \"docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef\",\n \"reason\": \"\",\n \"message\": \"\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"coredns\",\n \"io.kubernetes.pod.name\": \"coredns-coredns-64fc886fd4-clwtn\",\n \"io.kubernetes.pod.namespace\": \"cnf-default\",\n \"io.kubernetes.pod.uid\": \"1493bcca-c392-4f42-8125-d050b7590390\"\n },\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"30544dd1\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"udp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"UDP\\\"},{\\\"name\\\":\\\"tcp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/etc/coredns\",\n \"hostPath\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"selinuxRelabel\": false\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"hostPath\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"selinuxRelabel\": false\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"hostPath\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"selinuxRelabel\": false\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"hostPath\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"selinuxRelabel\": false\n }\n ],\n \"logPath\": \"/var/log/pods/cnf-default_coredns-coredns-64fc886fd4-clwtn_1493bcca-c392-4f42-8125-d050b7590390/coredns/0.log\"\n },\n \"info\": {\n \"sandboxID\": \"87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299\",\n \"pid\": 3113417,\n \"removing\": false,\n \"snapshotKey\": \"8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782\",\n \"snapshotter\": \"overlayfs\",\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"config\": {\n \"metadata\": {\n \"name\": \"coredns\"\n },\n \"image\": {\n \"image\": \"sha256:0a6cfbf7b0b6606f404f703a3ce24f3f637437b2d06d38008c033c42a2860f5f\"\n },\n \"args\": [\n \"-conf\",\n \"/etc/coredns/Corefile\"\n ],\n \"envs\": [\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT_TCP_53\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT\",\n \"value\": \"udp://10.96.24.213:53\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_ADDR\",\n \"value\": \"10.96.24.213\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_HOST\",\n \"value\": \"10.96.24.213\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_PROTO\",\n \"value\": \"udp\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP\",\n \"value\": \"tcp://10.96.24.213:53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT_UDP_53\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP\",\n \"value\": \"udp://10.96.24.213:53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_ADDR\",\n \"value\": \"10.96.24.213\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n }\n ],\n \"mounts\": [\n {\n \"container_path\": \"/etc/coredns\",\n \"host_path\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8\"\n }\n ],\n \"labels\": {\n \"io.kubernetes.container.name\": \"coredns\",\n \"io.kubernetes.pod.name\": \"coredns-coredns-64fc886fd4-clwtn\",\n \"io.kubernetes.pod.namespace\": \"cnf-default\",\n \"io.kubernetes.pod.uid\": \"1493bcca-c392-4f42-8125-d050b7590390\"\n },\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"30544dd1\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"udp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"UDP\\\"},{\\\"name\\\":\\\"tcp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"log_path\": \"coredns/0.log\",\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_quota\": 10000,\n \"cpu_shares\": 102,\n \"memory_limit_in_bytes\": 134217728,\n \"oom_score_adj\": -997,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"memory_swap_limit_in_bytes\": 134217728\n },\n \"security_context\": {\n \"namespace_options\": {\n \"pid\": 1\n },\n \"run_as_user\": {},\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"seccomp\": {\n \"profile_type\": 1\n }\n }\n }\n },\n \"runtimeSpec\": {\n \"ociVersion\": \"1.1.0\",\n \"process\": {\n \"user\": {\n \"uid\": 0,\n \"gid\": 0,\n \"additionalGids\": [\n 0\n ]\n },\n \"args\": [\n \"/coredns\",\n \"-conf\",\n \"/etc/coredns/Corefile\"\n ],\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=coredns-coredns-64fc886fd4-clwtn\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"COREDNS_COREDNS_SERVICE_PORT=53\",\n \"COREDNS_COREDNS_SERVICE_PORT_TCP_53=53\",\n \"COREDNS_COREDNS_PORT=udp://10.96.24.213:53\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"COREDNS_COREDNS_PORT_53_TCP_ADDR=10.96.24.213\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"COREDNS_COREDNS_SERVICE_HOST=10.96.24.213\",\n \"COREDNS_COREDNS_PORT_53_UDP_PROTO=udp\",\n \"COREDNS_COREDNS_PORT_53_UDP_PORT=53\",\n \"COREDNS_COREDNS_PORT_53_TCP=tcp://10.96.24.213:53\",\n \"COREDNS_COREDNS_PORT_53_TCP_PORT=53\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"COREDNS_COREDNS_SERVICE_PORT_UDP_53=53\",\n \"COREDNS_COREDNS_PORT_53_UDP=udp://10.96.24.213:53\",\n \"COREDNS_COREDNS_PORT_53_UDP_ADDR=10.96.24.213\",\n \"COREDNS_COREDNS_PORT_53_TCP_PROTO=tcp\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\"\n ],\n \"cwd\": \"/\",\n \"capabilities\": {\n \"bounding\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ],\n \"effective\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ],\n \"permitted\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ]\n },\n \"oomScoreAdj\": -997\n },\n \"root\": {\n \"path\": \"rootfs\"\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"type\": \"proc\",\n \"source\": \"proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ]\n },\n {\n \"destination\": \"/dev\",\n \"type\": \"tmpfs\",\n \"source\": \"tmpfs\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ]\n },\n {\n \"destination\": \"/dev/pts\",\n \"type\": \"devpts\",\n \"source\": \"devpts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ]\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"type\": \"mqueue\",\n \"source\": \"mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ]\n },\n {\n \"destination\": \"/sys\",\n \"type\": \"sysfs\",\n \"source\": \"sysfs\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"ro\"\n ]\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"type\": \"cgroup\",\n \"source\": \"cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"ro\"\n ]\n },\n {\n \"destination\": \"/etc/coredns\",\n \"type\": \"bind\",\n \"source\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ]\n },\n {\n \"destination\": \"/etc/hosts\",\n \"type\": \"bind\",\n \"source\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ]\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"type\": \"bind\",\n \"source\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ]\n },\n {\n \"destination\": \"/etc/hostname\",\n \"type\": \"bind\",\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ]\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"type\": \"bind\",\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ]\n },\n {\n \"destination\": \"/dev/shm\",\n \"type\": \"bind\",\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ]\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"type\": \"bind\",\n \"source\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ]\n }\n ],\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"coredns\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"docker.io/coredns/coredns:1.7.1\",\n \"io.kubernetes.cri.sandbox-id\": \"87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299\",\n \"io.kubernetes.cri.sandbox-name\": \"coredns-coredns-64fc886fd4-clwtn\",\n \"io.kubernetes.cri.sandbox-namespace\": \"cnf-default\",\n \"io.kubernetes.cri.sandbox-uid\": \"1493bcca-c392-4f42-8125-d050b7590390\"\n },\n \"linux\": {\n \"resources\": {\n \"devices\": [\n {\n \"allow\": false,\n \"access\": \"rwm\"\n }\n ],\n \"memory\": {\n \"limit\": 134217728,\n \"swap\": 134217728\n },\n \"cpu\": {\n \"shares\": 102,\n \"quota\": 10000,\n \"period\": 100000\n }\n },\n \"cgroupsPath\": \"kubelet-kubepods-pod1493bcca_c392_4f42_8125_d050b7590390.slice:cri-containerd:8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782\",\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"type\": \"ipc\",\n \"path\": \"/proc/3113384/ns/ipc\"\n },\n {\n \"type\": \"uts\",\n \"path\": \"/proc/3113384/ns/uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"type\": \"network\",\n \"path\": \"/proc/3113384/ns/net\"\n }\n ],\n \"maskedPaths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"readonlyPaths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ]\n }\n }\n }\n}\n", error: ""} D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: node_pid_by_container_id inspect: { "status": { "id": "8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "metadata": { "attempt": 0, "name": "coredns" }, "state": "CONTAINER_RUNNING", "createdAt": "2025-03-06T11:53:46.309860166Z", "startedAt": "2025-03-06T11:53:47.994396555Z", "finishedAt": "1970-01-01T00:00:00Z", "exitCode": 0, "image": { "image": "docker.io/coredns/coredns:1.7.1" }, "imageRef": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "reason": "", "message": "", "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "annotations": { "io.kubernetes.container.hash": "30544dd1", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "mounts": [ { "containerPath": "/etc/coredns", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "selinuxRelabel": false }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "selinuxRelabel": false }, { "containerPath": "/etc/hosts", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "selinuxRelabel": false }, { "containerPath": "/dev/termination-log", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "selinuxRelabel": false } ], "logPath": "/var/log/pods/cnf-default_coredns-coredns-64fc886fd4-clwtn_1493bcca-c392-4f42-8125-d050b7590390/coredns/0.log" }, "info": { "sandboxID": "87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299", "pid": 3113417, "removing": false, "snapshotKey": "8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "snapshotter": "overlayfs", "runtimeType": "io.containerd.runc.v2", "runtimeOptions": { "systemd_cgroup": true }, "config": { "metadata": { "name": "coredns" }, "image": { "image": "sha256:0a6cfbf7b0b6606f404f703a3ce24f3f637437b2d06d38008c033c42a2860f5f" }, "args": [ "-conf", "/etc/coredns/Corefile" ], "envs": [ { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "COREDNS_COREDNS_SERVICE_PORT", "value": "53" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_TCP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT", "value": "udp://10.96.24.213:53" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_ADDR", "value": "10.96.24.213" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "COREDNS_COREDNS_SERVICE_HOST", "value": "10.96.24.213" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PROTO", "value": "udp" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PORT", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_TCP", "value": "tcp://10.96.24.213:53" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PORT", "value": "53" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_UDP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP", "value": "udp://10.96.24.213:53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_ADDR", "value": "10.96.24.213" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" } ], "mounts": [ { "container_path": "/etc/coredns", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume", "readonly": true }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8" } ], "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "annotations": { "io.kubernetes.container.hash": "30544dd1", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "log_path": "coredns/0.log", "linux": { "resources": { "cpu_period": 100000, "cpu_quota": 10000, "cpu_shares": 102, "memory_limit_in_bytes": 134217728, "oom_score_adj": -997, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "memory_swap_limit_in_bytes": 134217728 }, "security_context": { "namespace_options": { "pid": 1 }, "run_as_user": {}, "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "seccomp": { "profile_type": 1 } } } }, "runtimeSpec": { "ociVersion": "1.1.0", "process": { "user": { "uid": 0, "gid": 0, "additionalGids": [ 0 ] }, "args": [ "/coredns", "-conf", "/etc/coredns/Corefile" ], "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=coredns-coredns-64fc886fd4-clwtn", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "COREDNS_COREDNS_SERVICE_PORT=53", "COREDNS_COREDNS_SERVICE_PORT_TCP_53=53", "COREDNS_COREDNS_PORT=udp://10.96.24.213:53", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "COREDNS_COREDNS_PORT_53_TCP_ADDR=10.96.24.213", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_PORT=tcp://10.96.0.1:443", "COREDNS_COREDNS_SERVICE_HOST=10.96.24.213", "COREDNS_COREDNS_PORT_53_UDP_PROTO=udp", "COREDNS_COREDNS_PORT_53_UDP_PORT=53", "COREDNS_COREDNS_PORT_53_TCP=tcp://10.96.24.213:53", "COREDNS_COREDNS_PORT_53_TCP_PORT=53", "KUBERNETES_PORT_443_TCP_PORT=443", "COREDNS_COREDNS_SERVICE_PORT_UDP_53=53", "COREDNS_COREDNS_PORT_53_UDP=udp://10.96.24.213:53", "COREDNS_COREDNS_PORT_53_UDP_ADDR=10.96.24.213", "COREDNS_COREDNS_PORT_53_TCP_PROTO=tcp", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_SERVICE_HOST=10.96.0.1" ], "cwd": "/", "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ] }, "oomScoreAdj": -997 }, "root": { "path": "rootfs" }, "mounts": [ { "destination": "/proc", "type": "proc", "source": "proc", "options": [ "nosuid", "noexec", "nodev" ] }, { "destination": "/dev", "type": "tmpfs", "source": "tmpfs", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ] }, { "destination": "/dev/pts", "type": "devpts", "source": "devpts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ] }, { "destination": "/dev/mqueue", "type": "mqueue", "source": "mqueue", "options": [ "nosuid", "noexec", "nodev" ] }, { "destination": "/sys", "type": "sysfs", "source": "sysfs", "options": [ "nosuid", "noexec", "nodev", "ro" ] }, { "destination": "/sys/fs/cgroup", "type": "cgroup", "source": "cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ] }, { "destination": "/etc/coredns", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume", "options": [ "rbind", "rprivate", "ro" ] }, { "destination": "/etc/hosts", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/dev/termination-log", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/etc/hostname", "type": "bind", "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/hostname", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/etc/resolv.conf", "type": "bind", "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/resolv.conf", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/dev/shm", "type": "bind", "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/shm", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz", "options": [ "rbind", "rprivate", "ro" ] } ], "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "annotations": { "io.kubernetes.cri.container-name": "coredns", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "docker.io/coredns/coredns:1.7.1", "io.kubernetes.cri.sandbox-id": "87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299", "io.kubernetes.cri.sandbox-name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.cri.sandbox-namespace": "cnf-default", "io.kubernetes.cri.sandbox-uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "linux": { "resources": { "devices": [ { "allow": false, "access": "rwm" } ], "memory": { "limit": 134217728, "swap": 134217728 }, "cpu": { "shares": 102, "quota": 10000, "period": 100000 } }, "cgroupsPath": "kubelet-kubepods-pod1493bcca_c392_4f42_8125_d050b7590390.slice:cri-containerd:8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "namespaces": [ { "type": "pid" }, { "type": "ipc", "path": "/proc/3113384/ns/ipc" }, { "type": "uts", "path": "/proc/3113384/ns/uts" }, { "type": "mount" }, { "type": "network", "path": "/proc/3113384/ns/net" } ], "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ] } } } } I, [2025-03-06 11:56:59 UTC #1422] INFO -- cnf-testsuite: node_pid_by_container_id pid: 3113417 I, [2025-03-06 11:56:59 UTC #1422] INFO -- cnf-testsuite: node pid (should never be pid 1): 3113417 I, [2025-03-06 11:56:59 UTC #1422] INFO -- cnf-testsuite: node name : v132-worker2 I, [2025-03-06 11:56:59 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:56:59 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- /bin/sh -c "find /proc -maxdepth 1 -regex '/proc/[0-9]+' -exec grep -l '8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782' {}/cgroup \; 2>/dev/null | sed -e 's,/proc/\([0-9]*\)/cgroup,\1,'" I, [2025-03-06 11:56:59 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- /bin/sh -c "find /proc -maxdepth 1 -regex '/proc/[0-9]+' -exec grep -l '8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782' {}/cgroup \; 2>/dev/null | sed -e 's,/proc/\([0-9]*\)/cgroup,\1,'" D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: 3113417 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "3113417\n", error: ""} I, [2025-03-06 11:56:59 UTC #1422] INFO -- cnf-testsuite: parsed pids: ["3113417"] I, [2025-03-06 11:56:59 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids I, [2025-03-06 11:56:59 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3113417 I, [2025-03-06 11:56:59 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:56:59 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:56:59 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3113417/status I, [2025-03-06 11:56:59 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3113417/status D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: coredns Umask: 0022 State: S (sleeping) Tgid: 3113417 Ngid: 0 Pid: 3113417 PPid: 3113360 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 3113417 1 NSpid: 3113417 1 NSpgid: 3113417 1 NSsid: 3113417 1 VmPeak: 748492 kB VmSize: 748492 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 41412 kB VmRSS: 41412 kB RssAnon: 12648 kB RssFile: 28764 kB RssShmem: 0 kB VmData: 108680 kB VmStk: 132 kB VmExe: 22032 kB VmLib: 8 kB VmPTE: 200 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 20 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffe7fc1feff CapInh: 0000000000000000 CapPrm: 00000000a80425fb CapEff: 00000000a80425fb CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 207 nonvoluntary_ctxt_switches: 14 D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcoredns\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3113417\nNgid:\t0\nPid:\t3113417\nPPid:\t3113360\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t3113417\t1\nNSpid:\t3113417\t1\nNSpgid:\t3113417\t1\nNSsid:\t3113417\t1\nVmPeak:\t 748492 kB\nVmSize:\t 748492 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 41412 kB\nVmRSS:\t 41412 kB\nRssAnon:\t 12648 kB\nRssFile:\t 28764 kB\nRssShmem:\t 0 kB\nVmData:\t 108680 kB\nVmStk:\t 132 kB\nVmExe:\t 22032 kB\nVmLib:\t 8 kB\nVmPTE:\t 200 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t20\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffe7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80425fb\nCapEff:\t00000000a80425fb\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t207\nnonvoluntary_ctxt_switches:\t14\n", error: ""} D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: proc process_statuses_by_node: ["Name:\tcoredns\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3113417\nNgid:\t0\nPid:\t3113417\nPPid:\t3113360\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t3113417\t1\nNSpid:\t3113417\t1\nNSpgid:\t3113417\t1\nNSsid:\t3113417\t1\nVmPeak:\t 748492 kB\nVmSize:\t 748492 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 41412 kB\nVmRSS:\t 41412 kB\nRssAnon:\t 12648 kB\nRssFile:\t 28764 kB\nRssShmem:\t 0 kB\nVmData:\t 108680 kB\nVmStk:\t 132 kB\nVmExe:\t 22032 kB\nVmLib:\t 8 kB\nVmPTE:\t 200 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t20\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffe7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80425fb\nCapEff:\t00000000a80425fb\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t207\nnonvoluntary_ctxt_switches:\t14\n"] I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite-proctree_by_pid: proctree_by_pid potential_parent_pid: 3113417 D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: proc_statuses: ["Name:\tcoredns\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3113417\nNgid:\t0\nPid:\t3113417\nPPid:\t3113360\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t3113417\t1\nNSpid:\t3113417\t1\nNSpgid:\t3113417\t1\nNSsid:\t3113417\t1\nVmPeak:\t 748492 kB\nVmSize:\t 748492 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 41412 kB\nVmRSS:\t 41412 kB\nRssAnon:\t 12648 kB\nRssFile:\t 28764 kB\nRssShmem:\t 0 kB\nVmData:\t 108680 kB\nVmStk:\t 132 kB\nVmExe:\t 22032 kB\nVmLib:\t 8 kB\nVmPTE:\t 200 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t20\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffe7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80425fb\nCapEff:\t00000000a80425fb\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t207\nnonvoluntary_ctxt_switches:\t14\n"] D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: coredns Umask: 0022 State: S (sleeping) Tgid: 3113417 Ngid: 0 Pid: 3113417 PPid: 3113360 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 3113417 1 NSpid: 3113417 1 NSpgid: 3113417 1 NSsid: 3113417 1 VmPeak: 748492 kB VmSize: 748492 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 41412 kB VmRSS: 41412 kB RssAnon: 12648 kB RssFile: 28764 kB RssShmem: 0 kB VmData: 108680 kB VmStk: 132 kB VmExe: 22032 kB VmLib: 8 kB VmPTE: 200 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 20 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffe7fc1feff CapInh: 0000000000000000 CapPrm: 00000000a80425fb CapEff: 00000000a80425fb CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 207 nonvoluntary_ctxt_switches: 14 D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "coredns", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3113417", "Ngid" => "0", "Pid" => "3113417", "PPid" => "3113360", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "3113417\t1", "NSpid" => "3113417\t1", "NSpgid" => "3113417\t1", "NSsid" => "3113417\t1", "VmPeak" => "748492 kB", "VmSize" => "748492 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "41412 kB", "VmRSS" => "41412 kB", "RssAnon" => "12648 kB", "RssFile" => "28764 kB", "RssShmem" => "0 kB", "VmData" => "108680 kB", "VmStk" => "132 kB", "VmExe" => "22032 kB", "VmLib" => "8 kB", "VmPTE" => "200 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "20", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffe7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "00000000a80425fb", "CapEff" => "00000000a80425fb", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "207", "nonvoluntary_ctxt_switches" => "14"} D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: cmdline_by_pid I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3113417/cmdline I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3113417/cmdline ✔️ 🏆PASSED: [single_process_type] Only one process type used ⚖👀 D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: /coredns-conf/etc/coredns/Corefile D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000", error: ""} I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: cmdline_by_node cmdline: {status: Process::Status[0], output: "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000", error: ""} D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: current_pid == potential_parent_pid D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: proctree: [{"Name" => "coredns", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3113417", "Ngid" => "0", "Pid" => "3113417", "PPid" => "3113360", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "3113417\t1", "NSpid" => "3113417\t1", "NSpgid" => "3113417\t1", "NSsid" => "3113417\t1", "VmPeak" => "748492 kB", "VmSize" => "748492 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "41412 kB", "VmRSS" => "41412 kB", "RssAnon" => "12648 kB", "RssFile" => "28764 kB", "RssShmem" => "0 kB", "VmData" => "108680 kB", "VmStk" => "132 kB", "VmExe" => "22032 kB", "VmLib" => "8 kB", "VmPTE" => "200 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "20", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffe7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "00000000a80425fb", "CapEff" => "00000000a80425fb", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "207", "nonvoluntary_ctxt_switches" => "14", "cmdline" => "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000"}] D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite-single_process_type: status name: coredns I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite-single_process_type: previous status name: initial_name I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: container_status_result.all?(true): false I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: pod_resp.all?(true): false D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: false I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: Constructed resource_named_tuple: {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"} D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: true D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: task single_process_type emoji: ⚖👀 I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "single_process_type", "emoji" => "⚖👀", "tags" => ["microservice", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["microservice", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: resp: ["microservice", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: task_type x: microservice acc: I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: task_points: task: single_process_type is worth: 100 points I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: cmd: /usr/local/bin/cnf-testsuite cert I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite-single_process_type: task_runtime=00:00:06.082903345; start_time=2025-03-06 11:56:54 UTC; end_time:2025-03-06 11:57:00 UTC I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "single_process_type", "emoji" => "⚖👀", "tags" => ["microservice", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["microservice", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: resp: ["microservice", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: task_type x: microservice acc: I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: upsert_task: task: single_process_type has status: passed and is awarded: 100 points. Runtime: 00:00:06.082903345 I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: task_runner args: # I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: ensure_cnf_installed? true I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: check_cnf_config args: # I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: check_cnf_config cnf: I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [zombie_handled] I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: CNF configs found: 1 D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: single_task_runner args: # "installed_cnf_files/cnf-testsuite.yml"}> I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite-zombie_handled: Starting test D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite-zombie_handled: cnf_config: # I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: cnf_resource_ymls I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: manifest_path_to_ymls file_path: installed_cnf_files/common_manifest.yml I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: manifest_string_to_ymls D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: manifest_string_to_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: cnf_resource_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Deployment D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"} D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Service D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"} D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: {} D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Pod D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ReplicaSet D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: StatefulSet D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: DaemonSet D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ServiceAccount D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: resources: [] D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: all resource: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}} D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}} D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite-KubectlClient::Get.resource_volumes: Deployment resource_name: coredns-coredns namespace: cnf-default I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "litmuschaos.io/chaos": "true", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 4, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4961737", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "availableReplicas": 1, "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 4, "readyReplicas": 1, "replicas": 1, "updatedReplicas": 1 } } I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: kubectl get resource volumes: [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}] D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: kubectl get resource containers kind: Deployment resource_name: coredns-coredns namespace: cnf-default I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "litmuschaos.io/chaos": "true", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 4, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4961737", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "availableReplicas": 1, "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 4, "readyReplicas": 1, "replicas": 1, "updatedReplicas": 1 } } D, [2025-03-06 11:57:00 UTC #1422] DEBUG -- cnf-testsuite: kubectl get resource containers: [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}]}] I, [2025-03-06 11:57:00 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default D, [2025-03-06 11:57:01 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "litmuschaos.io/chaos": "true", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 4, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4961737", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "availableReplicas": 1, "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 4, "readyReplicas": 1, "replicas": 1, "updatedReplicas": 1 } } I, [2025-03-06 11:57:01 UTC #1422] INFO -- cnf-testsuite: pods_by_resource D, [2025-03-06 11:57:01 UTC #1422] DEBUG -- cnf-testsuite: pods_by_resource resource: {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"annotations" => {"deployment.kubernetes.io/revision" => "1", "litmuschaos.io/chaos" => "true", "meta.helm.sh/release-name" => "coredns", "meta.helm.sh/release-namespace" => "cnf-default"}, "creationTimestamp" => "2025-03-06T11:52:37Z", "generation" => 4, "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/name" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS"}, "name" => "coredns-coredns", "namespace" => "cnf-default", "resourceVersion" => "4961737", "uid" => "489e7e00-25be-4697-9d6f-9e9bc6689c66"}, "spec" => {"progressDeadlineSeconds" => 600, "replicas" => 1, "revisionHistoryLimit" => 10, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"}}, "strategy" => {"rollingUpdate" => {"maxSurge" => "25%", "maxUnavailable" => 1}, "type" => "RollingUpdate"}, "template" => {"metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => nil, "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"}}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}]}], "dnsPolicy" => "Default", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}]}}}, "status" => {"availableReplicas" => 1, "conditions" => [{"lastTransitionTime" => "2025-03-06T11:52:37Z", "lastUpdateTime" => "2025-03-06T11:52:52Z", "message" => "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason" => "NewReplicaSetAvailable", "status" => "True", "type" => "Progressing"}, {"lastTransitionTime" => "2025-03-06T11:53:07Z", "lastUpdateTime" => "2025-03-06T11:53:07Z", "message" => "Deployment has minimum availability.", "reason" => "MinimumReplicasAvailable", "status" => "True", "type" => "Available"}], "observedGeneration" => 4, "readyReplicas" => 1, "replicas" => 1, "updatedReplicas" => 1}} I, [2025-03-06 11:57:01 UTC #1422] INFO -- cnf-testsuite: resource kind: Deployment I, [2025-03-06 11:57:01 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:01 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:01 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:01 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:01 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:01 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:01 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:01 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:01 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:01 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:01 UTC #1422] DEBUG -- cnf-testsuite: taints: [{"effect" => "NoSchedule", "key" => "node-role.kubernetes.io/control-plane"}] I, [2025-03-06 11:57:01 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:01 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:01 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:01 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:01 UTC #1422] DEBUG -- cnf-testsuite: taints: I, [2025-03-06 11:57:01 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:01 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:01 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:02 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:02 UTC #1422] DEBUG -- cnf-testsuite: taints: D, [2025-03-06 11:57:02 UTC #1422] DEBUG -- cnf-testsuite: resource_map items : [{"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker"}, "name" => "v132-worker", "resourceVersion" => "4962054", "uid" => "f5b473ab-dbca-4331-a088-561021e2400f"}, "spec" => {"podCIDR" => "10.244.2.0/24", "podCIDRs" => ["10.244.2.0/24"], "providerID" => "kind://docker/v132/v132-worker"}, "status" => {"addresses" => [{"address" => "172.24.0.9", "type" => "InternalIP"}, {"address" => "v132-worker", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter"], "sizeBytes" => 351519591}, {"names" => ["docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter"], "sizeBytes" => 344304298}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter"], "sizeBytes" => 298627136}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter"], "sizeBytes" => 285504787}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0"], "sizeBytes" => 58057865}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6"], "sizeBytes" => 11555354}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "71e7b586a0c24b35898016e092b898c4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "09103c12-a066-4570-92b0-221c8c39ecb8"}}}, {"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4961618", "uid" => "a499c571-be9e-41e0-a4ea-dc082e96fd5a"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest"], "sizeBytes" => 72080558}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "960341c8-b3a9-4b4a-bb0c-142338daaac6"}}}] D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: nodes: [{"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker"}, "name" => "v132-worker", "resourceVersion" => "4962054", "uid" => "f5b473ab-dbca-4331-a088-561021e2400f"}, "spec" => {"podCIDR" => "10.244.2.0/24", "podCIDRs" => ["10.244.2.0/24"], "providerID" => "kind://docker/v132/v132-worker"}, "status" => {"addresses" => [{"address" => "172.24.0.9", "type" => "InternalIP"}, {"address" => "v132-worker", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter"], "sizeBytes" => 351519591}, {"names" => ["docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter"], "sizeBytes" => 344304298}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter"], "sizeBytes" => 298627136}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter"], "sizeBytes" => 285504787}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0"], "sizeBytes" => 58057865}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6"], "sizeBytes" => 11555354}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "71e7b586a0c24b35898016e092b898c4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "09103c12-a066-4570-92b0-221c8c39ecb8"}}}, {"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4961618", "uid" => "a499c571-be9e-41e0-a4ea-dc082e96fd5a"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest"], "sizeBytes" => 72080558}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "960341c8-b3a9-4b4a-bb0c-142338daaac6"}}}] D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker"} D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker I, [2025-03-06 11:57:03 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-mh426", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961311", "uid" => "95aa40ad-9e0e-486b-a5d0-41f9194fd651"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-9vvm7", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-9vvm7", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:35Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:35Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:35Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-9vvm7", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.9", "hostIPs" => [{"ip" => "172.24.0.9"}], "phase" => "Running", "podIP" => "172.24.0.9", "podIPs" => [{"ip" => "172.24.0.9"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-mh426 D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-5d7tp", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "604", "uid" => "740809cc-4bf8-40e5-a556-d39f5cf1ff03"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-wpwg9", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-wpwg9", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:41Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:41Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:41Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:40Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-wpwg9", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.9", "hostIPs" => [{"ip" => "172.24.0.9"}], "phase" => "Running", "podIP" => "10.244.2.2", "podIPs" => [{"ip" => "10.244.2.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-5d7tp D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-4s8ph", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "509", "uid" => "0f87ae31-f6df-43d6-b42a-0236e849318a"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-5p2rs", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-5p2rs", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:20Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:26Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-5p2rs", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.9", "hostIPs" => [{"ip" => "172.24.0.9"}], "phase" => "Running", "podIP" => "172.24.0.9", "podIPs" => [{"ip" => "172.24.0.9"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:20Z"}} D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-4s8ph D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-dkr2j", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "500", "uid" => "14b0603b-2896-496e-84e3-572ff7452828"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-sq7d2", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-sq7d2", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:25Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:20Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:25Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:25Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:24Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-sq7d2", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.9", "hostIPs" => [{"ip" => "172.24.0.9"}], "phase" => "Running", "podIP" => "172.24.0.9", "podIPs" => [{"ip" => "172.24.0.9"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:20Z"}} D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-dkr2j D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:03 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 I, [2025-03-06 11:57:03 UTC #1422] INFO -- cnf-testsuite: resource kind: Deployment I, [2025-03-06 11:57:03 UTC #1422] INFO -- cnf-testsuite: pods_by_resource name: coredns-coredns D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: resource_labels kind: Deployment resource_name: coredns-coredns I, [2025-03-06 11:57:03 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "litmuschaos.io/chaos": "true", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 4, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4961737", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "availableReplicas": 1, "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 4, "readyReplicas": 1, "replicas": 1, "updatedReplicas": 1 } } D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: resource_labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} I, [2025-03-06 11:57:03 UTC #1422] INFO -- cnf-testsuite: pods_by_resource labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns I, [2025-03-06 11:57:03 UTC #1422] INFO -- cnf-testsuite: pod_name: coredns-coredns-64fc886fd4-clwtn I, [2025-03-06 11:57:03 UTC #1422] INFO -- cnf-testsuite: container_statuses: [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] I, [2025-03-06 11:57:03 UTC #1422] INFO -- cnf-testsuite: pod_name: coredns-coredns-64fc886fd4-clwtn I, [2025-03-06 11:57:03 UTC #1422] INFO -- cnf-testsuite: nodes_by_pod pod name: coredns-coredns-64fc886fd4-clwtn I, [2025-03-06 11:57:03 UTC #1422] INFO -- cnf-testsuite: resource_select I, [2025-03-06 11:57:03 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:03 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:03 UTC #1422] INFO -- cnf-testsuite: nodes size: 3 I, [2025-03-06 11:57:03 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:03 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:04 UTC #1422] INFO -- cnf-testsuite: nodes : {"apiVersion" => "v1", "items" => [{"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:05Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-control-plane", "kubernetes.io/os" => "linux", "node-role.kubernetes.io/control-plane" => "", "node.kubernetes.io/exclude-from-external-load-balancers" => ""}, "name" => "v132-control-plane", "resourceVersion" => "4961381", "uid" => "e3a8ca14-2d88-4785-a327-522fe918366a"}, "spec" => {"podCIDR" => "10.244.0.0/24", "podCIDRs" => ["10.244.0.0/24"], "providerID" => "kind://docker/v132/v132-control-plane", "taints" => [{"effect" => "NoSchedule", "key" => "node-role.kubernetes.io/control-plane"}]}, "status" => {"addresses" => [{"address" => "172.24.0.10", "type" => "InternalIP"}, {"address" => "v132-control-plane", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:52:51Z", "lastTransitionTime" => "2025-01-31T08:09:03Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:52:51Z", "lastTransitionTime" => "2025-01-31T08:09:03Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:52:51Z", "lastTransitionTime" => "2025-01-31T08:09:03Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:52:51Z", "lastTransitionTime" => "2025-01-31T08:09:29Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0"], "sizeBytes" => 58057865}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6"], "sizeBytes" => 2021226}, {"names" => ["registry.k8s.io/pause:3.10"], "sizeBytes" => 320368}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "c94df63d-d52d-4f3e-a918-e56af4ca2553"}}}, {"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker"}, "name" => "v132-worker", "resourceVersion" => "4962054", "uid" => "f5b473ab-dbca-4331-a088-561021e2400f"}, "spec" => {"podCIDR" => "10.244.2.0/24", "podCIDRs" => ["10.244.2.0/24"], "providerID" => "kind://docker/v132/v132-worker"}, "status" => {"addresses" => [{"address" => "172.24.0.9", "type" => "InternalIP"}, {"address" => "v132-worker", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter"], "sizeBytes" => 351519591}, {"names" => ["docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter"], "sizeBytes" => 344304298}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter"], "sizeBytes" => 298627136}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter"], "sizeBytes" => 285504787}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0"], "sizeBytes" => 58057865}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6"], "sizeBytes" => 11555354}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "71e7b586a0c24b35898016e092b898c4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "09103c12-a066-4570-92b0-221c8c39ecb8"}}}, {"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4961618", "uid" => "a499c571-be9e-41e0-a4ea-dc082e96fd5a"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest"], "sizeBytes" => 72080558}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "960341c8-b3a9-4b4a-bb0c-142338daaac6"}}}], "kind" => "List", "metadata" => {"resourceVersion" => ""}} I, [2025-03-06 11:57:04 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:04 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:04 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:04 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:04 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:04 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:04 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:04 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:04 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:04 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:04 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:04 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:04 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:04 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:04 UTC #1422] DEBUG -- cnf-testsuite: resource_map items : [{"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4961618", "uid" => "a499c571-be9e-41e0-a4ea-dc082e96fd5a"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest"], "sizeBytes" => 72080558}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "960341c8-b3a9-4b4a-bb0c-142338daaac6"}}}] D, [2025-03-06 11:57:04 UTC #1422] DEBUG -- cnf-testsuite: nodes: [{"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4961618", "uid" => "a499c571-be9e-41e0-a4ea-dc082e96fd5a"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest"], "sizeBytes" => 72080558}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "960341c8-b3a9-4b4a-bb0c-142338daaac6"}}}] I, [2025-03-06 11:57:04 UTC #1422] INFO -- cnf-testsuite: nodes_by_resource done I, [2025-03-06 11:57:04 UTC #1422] INFO -- cnf-testsuite: before ready containerStatuses container_id 8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782 I, [2025-03-06 11:57:04 UTC #1422] INFO -- cnf-testsuite: containerStatuses container_id 8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782 I, [2025-03-06 11:57:04 UTC #1422] INFO -- cnf-testsuite: node_pid_by_container_id container_id: 8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782 I, [2025-03-06 11:57:04 UTC #1422] INFO -- cnf-testsuite: parse_container_id container_id: 8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782 I, [2025-03-06 11:57:04 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:04 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:04 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:04 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:04 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- crictl inspect 8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782 I, [2025-03-06 11:57:05 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- crictl inspect 8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: { "status": { "id": "8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "metadata": { "attempt": 0, "name": "coredns" }, "state": "CONTAINER_RUNNING", "createdAt": "2025-03-06T11:53:46.309860166Z", "startedAt": "2025-03-06T11:53:47.994396555Z", "finishedAt": "1970-01-01T00:00:00Z", "exitCode": 0, "image": { "image": "docker.io/coredns/coredns:1.7.1" }, "imageRef": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "reason": "", "message": "", "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "annotations": { "io.kubernetes.container.hash": "30544dd1", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "mounts": [ { "containerPath": "/etc/coredns", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "selinuxRelabel": false }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "selinuxRelabel": false }, { "containerPath": "/etc/hosts", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "selinuxRelabel": false }, { "containerPath": "/dev/termination-log", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "selinuxRelabel": false } ], "logPath": "/var/log/pods/cnf-default_coredns-coredns-64fc886fd4-clwtn_1493bcca-c392-4f42-8125-d050b7590390/coredns/0.log" }, "info": { "sandboxID": "87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299", "pid": 3113417, "removing": false, "snapshotKey": "8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "snapshotter": "overlayfs", "runtimeType": "io.containerd.runc.v2", "runtimeOptions": { "systemd_cgroup": true }, "config": { "metadata": { "name": "coredns" }, "image": { "image": "sha256:0a6cfbf7b0b6606f404f703a3ce24f3f637437b2d06d38008c033c42a2860f5f" }, "args": [ "-conf", "/etc/coredns/Corefile" ], "envs": [ { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "COREDNS_COREDNS_SERVICE_PORT", "value": "53" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_TCP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT", "value": "udp://10.96.24.213:53" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_ADDR", "value": "10.96.24.213" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "COREDNS_COREDNS_SERVICE_HOST", "value": "10.96.24.213" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PROTO", "value": "udp" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PORT", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_TCP", "value": "tcp://10.96.24.213:53" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PORT", "value": "53" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_UDP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP", "value": "udp://10.96.24.213:53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_ADDR", "value": "10.96.24.213" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" } ], "mounts": [ { "container_path": "/etc/coredns", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume", "readonly": true }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8" } ], "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "annotations": { "io.kubernetes.container.hash": "30544dd1", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "log_path": "coredns/0.log", "linux": { "resources": { "cpu_period": 100000, "cpu_quota": 10000, "cpu_shares": 102, "memory_limit_in_bytes": 134217728, "oom_score_adj": -997, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "memory_swap_limit_in_bytes": 134217728 }, "security_context": { "namespace_options": { "pid": 1 }, "run_as_user": {}, "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "seccomp": { "profile_type": 1 } } } }, "runtimeSpec": { "ociVersion": "1.1.0", "process": { "user": { "uid": 0, "gid": 0, "additionalGids": [ 0 ] }, "args": [ "/coredns", "-conf", "/etc/coredns/Corefile" ], "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=coredns-coredns-64fc886fd4-clwtn", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "COREDNS_COREDNS_SERVICE_PORT=53", "COREDNS_COREDNS_SERVICE_PORT_TCP_53=53", "COREDNS_COREDNS_PORT=udp://10.96.24.213:53", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "COREDNS_COREDNS_PORT_53_TCP_ADDR=10.96.24.213", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_PORT=tcp://10.96.0.1:443", "COREDNS_COREDNS_SERVICE_HOST=10.96.24.213", "COREDNS_COREDNS_PORT_53_UDP_PROTO=udp", "COREDNS_COREDNS_PORT_53_UDP_PORT=53", "COREDNS_COREDNS_PORT_53_TCP=tcp://10.96.24.213:53", "COREDNS_COREDNS_PORT_53_TCP_PORT=53", "KUBERNETES_PORT_443_TCP_PORT=443", "COREDNS_COREDNS_SERVICE_PORT_UDP_53=53", "COREDNS_COREDNS_PORT_53_UDP=udp://10.96.24.213:53", "COREDNS_COREDNS_PORT_53_UDP_ADDR=10.96.24.213", "COREDNS_COREDNS_PORT_53_TCP_PROTO=tcp", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_SERVICE_HOST=10.96.0.1" ], "cwd": "/", "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ] }, "oomScoreAdj": -997 }, "root": { "path": "rootfs" }, "mounts": [ { "destination": "/proc", "type": "proc", "source": "proc", "options": [ "nosuid", "noexec", "nodev" ] }, { "destination": "/dev", "type": "tmpfs", "source": "tmpfs", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ] }, { "destination": "/dev/pts", "type": "devpts", "source": "devpts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ] }, { "destination": "/dev/mqueue", "type": "mqueue", "source": "mqueue", "options": [ "nosuid", "noexec", "nodev" ] }, { "destination": "/sys", "type": "sysfs", "source": "sysfs", "options": [ "nosuid", "noexec", "nodev", "ro" ] }, { "destination": "/sys/fs/cgroup", "type": "cgroup", "source": "cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ] }, { "destination": "/etc/coredns", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume", "options": [ "rbind", "rprivate", "ro" ] }, { "destination": "/etc/hosts", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/dev/termination-log", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/etc/hostname", "type": "bind", "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/hostname", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/etc/resolv.conf", "type": "bind", "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/resolv.conf", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/dev/shm", "type": "bind", "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/shm", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz", "options": [ "rbind", "rprivate", "ro" ] } ], "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "annotations": { "io.kubernetes.cri.container-name": "coredns", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "docker.io/coredns/coredns:1.7.1", "io.kubernetes.cri.sandbox-id": "87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299", "io.kubernetes.cri.sandbox-name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.cri.sandbox-namespace": "cnf-default", "io.kubernetes.cri.sandbox-uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "linux": { "resources": { "devices": [ { "allow": false, "access": "rwm" } ], "memory": { "limit": 134217728, "swap": 134217728 }, "cpu": { "shares": 102, "quota": 10000, "period": 100000 } }, "cgroupsPath": "kubelet-kubepods-pod1493bcca_c392_4f42_8125_d050b7590390.slice:cri-containerd:8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "namespaces": [ { "type": "pid" }, { "type": "ipc", "path": "/proc/3113384/ns/ipc" }, { "type": "uts", "path": "/proc/3113384/ns/uts" }, { "type": "mount" }, { "type": "network", "path": "/proc/3113384/ns/net" } ], "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ] } } } } D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "{\n \"status\": {\n \"id\": \"8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"coredns\"\n },\n \"state\": \"CONTAINER_RUNNING\",\n \"createdAt\": \"2025-03-06T11:53:46.309860166Z\",\n \"startedAt\": \"2025-03-06T11:53:47.994396555Z\",\n \"finishedAt\": \"1970-01-01T00:00:00Z\",\n \"exitCode\": 0,\n \"image\": {\n \"image\": \"docker.io/coredns/coredns:1.7.1\"\n },\n \"imageRef\": \"docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef\",\n \"reason\": \"\",\n \"message\": \"\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"coredns\",\n \"io.kubernetes.pod.name\": \"coredns-coredns-64fc886fd4-clwtn\",\n \"io.kubernetes.pod.namespace\": \"cnf-default\",\n \"io.kubernetes.pod.uid\": \"1493bcca-c392-4f42-8125-d050b7590390\"\n },\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"30544dd1\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"udp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"UDP\\\"},{\\\"name\\\":\\\"tcp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/etc/coredns\",\n \"hostPath\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"selinuxRelabel\": false\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"hostPath\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"selinuxRelabel\": false\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"hostPath\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"selinuxRelabel\": false\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"hostPath\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"selinuxRelabel\": false\n }\n ],\n \"logPath\": \"/var/log/pods/cnf-default_coredns-coredns-64fc886fd4-clwtn_1493bcca-c392-4f42-8125-d050b7590390/coredns/0.log\"\n },\n \"info\": {\n \"sandboxID\": \"87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299\",\n \"pid\": 3113417,\n \"removing\": false,\n \"snapshotKey\": \"8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782\",\n \"snapshotter\": \"overlayfs\",\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"config\": {\n \"metadata\": {\n \"name\": \"coredns\"\n },\n \"image\": {\n \"image\": \"sha256:0a6cfbf7b0b6606f404f703a3ce24f3f637437b2d06d38008c033c42a2860f5f\"\n },\n \"args\": [\n \"-conf\",\n \"/etc/coredns/Corefile\"\n ],\n \"envs\": [\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT_TCP_53\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT\",\n \"value\": \"udp://10.96.24.213:53\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_ADDR\",\n \"value\": \"10.96.24.213\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_HOST\",\n \"value\": \"10.96.24.213\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_PROTO\",\n \"value\": \"udp\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP\",\n \"value\": \"tcp://10.96.24.213:53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT_UDP_53\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP\",\n \"value\": \"udp://10.96.24.213:53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_ADDR\",\n \"value\": \"10.96.24.213\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n }\n ],\n \"mounts\": [\n {\n \"container_path\": \"/etc/coredns\",\n \"host_path\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8\"\n }\n ],\n \"labels\": {\n \"io.kubernetes.container.name\": \"coredns\",\n \"io.kubernetes.pod.name\": \"coredns-coredns-64fc886fd4-clwtn\",\n \"io.kubernetes.pod.namespace\": \"cnf-default\",\n \"io.kubernetes.pod.uid\": \"1493bcca-c392-4f42-8125-d050b7590390\"\n },\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"30544dd1\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"udp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"UDP\\\"},{\\\"name\\\":\\\"tcp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"log_path\": \"coredns/0.log\",\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_quota\": 10000,\n \"cpu_shares\": 102,\n \"memory_limit_in_bytes\": 134217728,\n \"oom_score_adj\": -997,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"memory_swap_limit_in_bytes\": 134217728\n },\n \"security_context\": {\n \"namespace_options\": {\n \"pid\": 1\n },\n \"run_as_user\": {},\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"seccomp\": {\n \"profile_type\": 1\n }\n }\n }\n },\n \"runtimeSpec\": {\n \"ociVersion\": \"1.1.0\",\n \"process\": {\n \"user\": {\n \"uid\": 0,\n \"gid\": 0,\n \"additionalGids\": [\n 0\n ]\n },\n \"args\": [\n \"/coredns\",\n \"-conf\",\n \"/etc/coredns/Corefile\"\n ],\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=coredns-coredns-64fc886fd4-clwtn\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"COREDNS_COREDNS_SERVICE_PORT=53\",\n \"COREDNS_COREDNS_SERVICE_PORT_TCP_53=53\",\n \"COREDNS_COREDNS_PORT=udp://10.96.24.213:53\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"COREDNS_COREDNS_PORT_53_TCP_ADDR=10.96.24.213\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"COREDNS_COREDNS_SERVICE_HOST=10.96.24.213\",\n \"COREDNS_COREDNS_PORT_53_UDP_PROTO=udp\",\n \"COREDNS_COREDNS_PORT_53_UDP_PORT=53\",\n \"COREDNS_COREDNS_PORT_53_TCP=tcp://10.96.24.213:53\",\n \"COREDNS_COREDNS_PORT_53_TCP_PORT=53\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"COREDNS_COREDNS_SERVICE_PORT_UDP_53=53\",\n \"COREDNS_COREDNS_PORT_53_UDP=udp://10.96.24.213:53\",\n \"COREDNS_COREDNS_PORT_53_UDP_ADDR=10.96.24.213\",\n \"COREDNS_COREDNS_PORT_53_TCP_PROTO=tcp\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\"\n ],\n \"cwd\": \"/\",\n \"capabilities\": {\n \"bounding\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ],\n \"effective\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ],\n \"permitted\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ]\n },\n \"oomScoreAdj\": -997\n },\n \"root\": {\n \"path\": \"rootfs\"\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"type\": \"proc\",\n \"source\": \"proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ]\n },\n {\n \"destination\": \"/dev\",\n \"type\": \"tmpfs\",\n \"source\": \"tmpfs\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ]\n },\n {\n \"destination\": \"/dev/pts\",\n \"type\": \"devpts\",\n \"source\": \"devpts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ]\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"type\": \"mqueue\",\n \"source\": \"mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ]\n },\n {\n \"destination\": \"/sys\",\n \"type\": \"sysfs\",\n \"source\": \"sysfs\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"ro\"\n ]\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"type\": \"cgroup\",\n \"source\": \"cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"ro\"\n ]\n },\n {\n \"destination\": \"/etc/coredns\",\n \"type\": \"bind\",\n \"source\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ]\n },\n {\n \"destination\": \"/etc/hosts\",\n \"type\": \"bind\",\n \"source\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ]\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"type\": \"bind\",\n \"source\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ]\n },\n {\n \"destination\": \"/etc/hostname\",\n \"type\": \"bind\",\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ]\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"type\": \"bind\",\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ]\n },\n {\n \"destination\": \"/dev/shm\",\n \"type\": \"bind\",\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ]\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"type\": \"bind\",\n \"source\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ]\n }\n ],\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"coredns\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"docker.io/coredns/coredns:1.7.1\",\n \"io.kubernetes.cri.sandbox-id\": \"87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299\",\n \"io.kubernetes.cri.sandbox-name\": \"coredns-coredns-64fc886fd4-clwtn\",\n \"io.kubernetes.cri.sandbox-namespace\": \"cnf-default\",\n \"io.kubernetes.cri.sandbox-uid\": \"1493bcca-c392-4f42-8125-d050b7590390\"\n },\n \"linux\": {\n \"resources\": {\n \"devices\": [\n {\n \"allow\": false,\n \"access\": \"rwm\"\n }\n ],\n \"memory\": {\n \"limit\": 134217728,\n \"swap\": 134217728\n },\n \"cpu\": {\n \"shares\": 102,\n \"quota\": 10000,\n \"period\": 100000\n }\n },\n \"cgroupsPath\": \"kubelet-kubepods-pod1493bcca_c392_4f42_8125_d050b7590390.slice:cri-containerd:8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782\",\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"type\": \"ipc\",\n \"path\": \"/proc/3113384/ns/ipc\"\n },\n {\n \"type\": \"uts\",\n \"path\": \"/proc/3113384/ns/uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"type\": \"network\",\n \"path\": \"/proc/3113384/ns/net\"\n }\n ],\n \"maskedPaths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"readonlyPaths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ]\n }\n }\n }\n}\n", error: ""} D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: node_pid_by_container_id inspect: { "status": { "id": "8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "metadata": { "attempt": 0, "name": "coredns" }, "state": "CONTAINER_RUNNING", "createdAt": "2025-03-06T11:53:46.309860166Z", "startedAt": "2025-03-06T11:53:47.994396555Z", "finishedAt": "1970-01-01T00:00:00Z", "exitCode": 0, "image": { "image": "docker.io/coredns/coredns:1.7.1" }, "imageRef": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "reason": "", "message": "", "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "annotations": { "io.kubernetes.container.hash": "30544dd1", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "mounts": [ { "containerPath": "/etc/coredns", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "selinuxRelabel": false }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "selinuxRelabel": false }, { "containerPath": "/etc/hosts", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "selinuxRelabel": false }, { "containerPath": "/dev/termination-log", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "selinuxRelabel": false } ], "logPath": "/var/log/pods/cnf-default_coredns-coredns-64fc886fd4-clwtn_1493bcca-c392-4f42-8125-d050b7590390/coredns/0.log" }, "info": { "sandboxID": "87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299", "pid": 3113417, "removing": false, "snapshotKey": "8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "snapshotter": "overlayfs", "runtimeType": "io.containerd.runc.v2", "runtimeOptions": { "systemd_cgroup": true }, "config": { "metadata": { "name": "coredns" }, "image": { "image": "sha256:0a6cfbf7b0b6606f404f703a3ce24f3f637437b2d06d38008c033c42a2860f5f" }, "args": [ "-conf", "/etc/coredns/Corefile" ], "envs": [ { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "COREDNS_COREDNS_SERVICE_PORT", "value": "53" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_TCP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT", "value": "udp://10.96.24.213:53" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_ADDR", "value": "10.96.24.213" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "COREDNS_COREDNS_SERVICE_HOST", "value": "10.96.24.213" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PROTO", "value": "udp" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PORT", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_TCP", "value": "tcp://10.96.24.213:53" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PORT", "value": "53" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_UDP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP", "value": "udp://10.96.24.213:53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_ADDR", "value": "10.96.24.213" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" } ], "mounts": [ { "container_path": "/etc/coredns", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume", "readonly": true }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8" } ], "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "annotations": { "io.kubernetes.container.hash": "30544dd1", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "log_path": "coredns/0.log", "linux": { "resources": { "cpu_period": 100000, "cpu_quota": 10000, "cpu_shares": 102, "memory_limit_in_bytes": 134217728, "oom_score_adj": -997, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "memory_swap_limit_in_bytes": 134217728 }, "security_context": { "namespace_options": { "pid": 1 }, "run_as_user": {}, "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "seccomp": { "profile_type": 1 } } } }, "runtimeSpec": { "ociVersion": "1.1.0", "process": { "user": { "uid": 0, "gid": 0, "additionalGids": [ 0 ] }, "args": [ "/coredns", "-conf", "/etc/coredns/Corefile" ], "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=coredns-coredns-64fc886fd4-clwtn", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "COREDNS_COREDNS_SERVICE_PORT=53", "COREDNS_COREDNS_SERVICE_PORT_TCP_53=53", "COREDNS_COREDNS_PORT=udp://10.96.24.213:53", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "COREDNS_COREDNS_PORT_53_TCP_ADDR=10.96.24.213", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_PORT=tcp://10.96.0.1:443", "COREDNS_COREDNS_SERVICE_HOST=10.96.24.213", "COREDNS_COREDNS_PORT_53_UDP_PROTO=udp", "COREDNS_COREDNS_PORT_53_UDP_PORT=53", "COREDNS_COREDNS_PORT_53_TCP=tcp://10.96.24.213:53", "COREDNS_COREDNS_PORT_53_TCP_PORT=53", "KUBERNETES_PORT_443_TCP_PORT=443", "COREDNS_COREDNS_SERVICE_PORT_UDP_53=53", "COREDNS_COREDNS_PORT_53_UDP=udp://10.96.24.213:53", "COREDNS_COREDNS_PORT_53_UDP_ADDR=10.96.24.213", "COREDNS_COREDNS_PORT_53_TCP_PROTO=tcp", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_SERVICE_HOST=10.96.0.1" ], "cwd": "/", "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ] }, "oomScoreAdj": -997 }, "root": { "path": "rootfs" }, "mounts": [ { "destination": "/proc", "type": "proc", "source": "proc", "options": [ "nosuid", "noexec", "nodev" ] }, { "destination": "/dev", "type": "tmpfs", "source": "tmpfs", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ] }, { "destination": "/dev/pts", "type": "devpts", "source": "devpts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ] }, { "destination": "/dev/mqueue", "type": "mqueue", "source": "mqueue", "options": [ "nosuid", "noexec", "nodev" ] }, { "destination": "/sys", "type": "sysfs", "source": "sysfs", "options": [ "nosuid", "noexec", "nodev", "ro" ] }, { "destination": "/sys/fs/cgroup", "type": "cgroup", "source": "cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ] }, { "destination": "/etc/coredns", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume", "options": [ "rbind", "rprivate", "ro" ] }, { "destination": "/etc/hosts", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/dev/termination-log", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/etc/hostname", "type": "bind", "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/hostname", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/etc/resolv.conf", "type": "bind", "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/resolv.conf", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/dev/shm", "type": "bind", "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/shm", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz", "options": [ "rbind", "rprivate", "ro" ] } ], "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "annotations": { "io.kubernetes.cri.container-name": "coredns", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "docker.io/coredns/coredns:1.7.1", "io.kubernetes.cri.sandbox-id": "87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299", "io.kubernetes.cri.sandbox-name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.cri.sandbox-namespace": "cnf-default", "io.kubernetes.cri.sandbox-uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "linux": { "resources": { "devices": [ { "allow": false, "access": "rwm" } ], "memory": { "limit": 134217728, "swap": 134217728 }, "cpu": { "shares": 102, "quota": 10000, "period": 100000 } }, "cgroupsPath": "kubelet-kubepods-pod1493bcca_c392_4f42_8125_d050b7590390.slice:cri-containerd:8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "namespaces": [ { "type": "pid" }, { "type": "ipc", "path": "/proc/3113384/ns/ipc" }, { "type": "uts", "path": "/proc/3113384/ns/uts" }, { "type": "mount" }, { "type": "network", "path": "/proc/3113384/ns/net" } ], "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ] } } } } I, [2025-03-06 11:57:05 UTC #1422] INFO -- cnf-testsuite: node_pid_by_container_id pid: 3113417 I, [2025-03-06 11:57:05 UTC #1422] INFO -- cnf-testsuite: node pid (should never be pid 1): 3113417 I, [2025-03-06 11:57:05 UTC #1422] INFO -- cnf-testsuite: node name : v132-worker2 I, [2025-03-06 11:57:05 UTC #1422] INFO -- cnf-testsuite: pids I, [2025-03-06 11:57:05 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:05 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- ls /proc/ I, [2025-03-06 11:57:05 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- ls /proc/ D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: 1 162 1749 178 284 3111878 3111903 3111937 3111957 3112901 3112926 3112959 3113360 3113384 3113417 3114203 372 384 423 430 479 680 793 818 854 acpi bootconfig buddyinfo bus cgroups cmdline consoles cpuinfo crypto devices diskstats dma driver dynamic_debug execdomains fb filesystems fs interrupts iomem ioports irq kallsyms kcore key-users keys kmsg kpagecgroup kpagecount kpageflags loadavg locks mdstat meminfo misc modules mounts mtrr net pagetypeinfo partitions pressure schedstat scsi self slabinfo softirqs stat swaps sys sysrq-trigger sysvipc thread-self timer_list tty uptime version version_signature vmallocinfo vmstat zoneinfo D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "1\n162\n1749\n178\n284\n3111878\n3111903\n3111937\n3111957\n3112901\n3112926\n3112959\n3113360\n3113384\n3113417\n3114203\n372\n384\n423\n430\n479\n680\n793\n818\n854\nacpi\nbootconfig\nbuddyinfo\nbus\ncgroups\ncmdline\nconsoles\ncpuinfo\ncrypto\ndevices\ndiskstats\ndma\ndriver\ndynamic_debug\nexecdomains\nfb\nfilesystems\nfs\ninterrupts\niomem\nioports\nirq\nkallsyms\nkcore\nkey-users\nkeys\nkmsg\nkpagecgroup\nkpagecount\nkpageflags\nloadavg\nlocks\nmdstat\nmeminfo\nmisc\nmodules\nmounts\nmtrr\nnet\npagetypeinfo\npartitions\npressure\nschedstat\nscsi\nself\nslabinfo\nsoftirqs\nstat\nswaps\nsys\nsysrq-trigger\nsysvipc\nthread-self\ntimer_list\ntty\nuptime\nversion\nversion_signature\nvmallocinfo\nvmstat\nzoneinfo\n", error: ""} I, [2025-03-06 11:57:05 UTC #1422] INFO -- cnf-testsuite: pids ls_proc: {status: Process::Status[0], output: "1\n162\n1749\n178\n284\n3111878\n3111903\n3111937\n3111957\n3112901\n3112926\n3112959\n3113360\n3113384\n3113417\n3114203\n372\n384\n423\n430\n479\n680\n793\n818\n854\nacpi\nbootconfig\nbuddyinfo\nbus\ncgroups\ncmdline\nconsoles\ncpuinfo\ncrypto\ndevices\ndiskstats\ndma\ndriver\ndynamic_debug\nexecdomains\nfb\nfilesystems\nfs\ninterrupts\niomem\nioports\nirq\nkallsyms\nkcore\nkey-users\nkeys\nkmsg\nkpagecgroup\nkpagecount\nkpageflags\nloadavg\nlocks\nmdstat\nmeminfo\nmisc\nmodules\nmounts\nmtrr\nnet\npagetypeinfo\npartitions\npressure\nschedstat\nscsi\nself\nslabinfo\nsoftirqs\nstat\nswaps\nsys\nsysrq-trigger\nsysvipc\nthread-self\ntimer_list\ntty\nuptime\nversion\nversion_signature\nvmallocinfo\nvmstat\nzoneinfo\n", error: ""} D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: parse_ls ls: 1 162 1749 178 284 3111878 3111903 3111937 3111957 3112901 3112926 3112959 3113360 3113384 3113417 3114203 372 384 423 430 479 680 793 818 854 acpi bootconfig buddyinfo bus cgroups cmdline consoles cpuinfo crypto devices diskstats dma driver dynamic_debug execdomains fb filesystems fs interrupts iomem ioports irq kallsyms kcore key-users keys kmsg kpagecgroup kpagecount kpageflags loadavg locks mdstat meminfo misc modules mounts mtrr net pagetypeinfo partitions pressure schedstat scsi self slabinfo softirqs stat swaps sys sysrq-trigger sysvipc thread-self timer_list tty uptime version version_signature vmallocinfo vmstat zoneinfo D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: parse_ls parsed: ["1", "162", "1749", "178", "284", "3111878", "3111903", "3111937", "3111957", "3112901", "3112926", "3112959", "3113360", "3113384", "3113417", "3114203", "372", "384", "423", "430", "479", "680", "793", "818", "854", "acpi", "bootconfig", "buddyinfo", "bus", "cgroups", "cmdline", "consoles", "cpuinfo", "crypto", "devices", "diskstats", "dma", "driver", "dynamic_debug", "execdomains", "fb", "filesystems", "fs", "interrupts", "iomem", "ioports", "irq", "kallsyms", "kcore", "key-users", "keys", "kmsg", "kpagecgroup", "kpagecount", "kpageflags", "loadavg", "locks", "mdstat", "meminfo", "misc", "modules", "mounts", "mtrr", "net", "pagetypeinfo", "partitions", "pressure", "schedstat", "scsi", "self", "slabinfo", "softirqs", "stat", "swaps", "sys", "sysrq-trigger", "sysvipc", "thread-self", "timer_list", "tty", "uptime", "version", "version_signature", "vmallocinfo", "vmstat", "zoneinfo"] D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: pids_from_ls_proc ls: ["1", "162", "1749", "178", "284", "3111878", "3111903", "3111937", "3111957", "3112901", "3112926", "3112959", "3113360", "3113384", "3113417", "3114203", "372", "384", "423", "430", "479", "680", "793", "818", "854", "acpi", "bootconfig", "buddyinfo", "bus", "cgroups", "cmdline", "consoles", "cpuinfo", "crypto", "devices", "diskstats", "dma", "driver", "dynamic_debug", "execdomains", "fb", "filesystems", "fs", "interrupts", "iomem", "ioports", "irq", "kallsyms", "kcore", "key-users", "keys", "kmsg", "kpagecgroup", "kpagecount", "kpageflags", "loadavg", "locks", "mdstat", "meminfo", "misc", "modules", "mounts", "mtrr", "net", "pagetypeinfo", "partitions", "pressure", "schedstat", "scsi", "self", "slabinfo", "softirqs", "stat", "swaps", "sys", "sysrq-trigger", "sysvipc", "thread-self", "timer_list", "tty", "uptime", "version", "version_signature", "vmallocinfo", "vmstat", "zoneinfo"] D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: pids_from_ls_proc pids: ["1", "162", "1749", "178", "284", "3111878", "3111903", "3111937", "3111957", "3112901", "3112926", "3112959", "3113360", "3113384", "3113417", "3114203", "372", "384", "423", "430", "479", "680", "793", "818", "854"] I, [2025-03-06 11:57:05 UTC #1422] INFO -- cnf-testsuite: parsed pids: ["1", "162", "1749", "178", "284", "3111878", "3111903", "3111937", "3111957", "3112901", "3112926", "3112959", "3113360", "3113384", "3113417", "3114203", "372", "384", "423", "430", "479", "680", "793", "818", "854"] I, [2025-03-06 11:57:05 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids I, [2025-03-06 11:57:05 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 1 I, [2025-03-06 11:57:05 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:05 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:05 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/1/status I, [2025-03-06 11:57:06 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/1/status D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: systemd Umask: 0000 State: S (sleeping) Tgid: 1 Ngid: 0 Pid: 1 PPid: 0 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 256 Groups: NStgid: 1 NSpid: 1 NSpgid: 1 NSsid: 1 VmPeak: 35920 kB VmSize: 35800 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 25920 kB VmRSS: 25332 kB RssAnon: 18052 kB RssFile: 7280 kB RssShmem: 0 kB VmData: 16892 kB VmStk: 1040 kB VmExe: 40 kB VmLib: 10680 kB VmPTE: 112 kB VmSwap: 672 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 7fe3c0fe28014a03 SigIgn: 0000000000001000 SigCgt: 00000000000004ec CapInh: 0000003fffffffff CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 854445 nonvoluntary_ctxt_switches: 37992 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsystemd\nUmask:\t0000\nState:\tS (sleeping)\nTgid:\t1\nNgid:\t0\nPid:\t1\nPPid:\t0\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t256\nGroups:\t \nNStgid:\t1\nNSpid:\t1\nNSpgid:\t1\nNSsid:\t1\nVmPeak:\t 35920 kB\nVmSize:\t 35800 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 25920 kB\nVmRSS:\t 25332 kB\nRssAnon:\t 18052 kB\nRssFile:\t 7280 kB\nRssShmem:\t 0 kB\nVmData:\t 16892 kB\nVmStk:\t 1040 kB\nVmExe:\t 40 kB\nVmLib:\t 10680 kB\nVmPTE:\t 112 kB\nVmSwap:\t 672 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t7fe3c0fe28014a03\nSigIgn:\t0000000000001000\nSigCgt:\t00000000000004ec\nCapInh:\t0000003fffffffff\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t854445\nnonvoluntary_ctxt_switches:\t37992\n", error: ""} I, [2025-03-06 11:57:06 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 162 I, [2025-03-06 11:57:06 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:06 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/162/status I, [2025-03-06 11:57:06 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/162/status D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: systemd-journal Umask: 0022 State: S (sleeping) Tgid: 162 Ngid: 104252 Pid: 162 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 162 NSpid: 162 NSpgid: 162 NSsid: 162 VmPeak: 426936 kB VmSize: 348768 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 283184 kB VmRSS: 221268 kB RssAnon: 540 kB RssFile: 5680 kB RssShmem: 215048 kB VmData: 8968 kB VmStk: 132 kB VmExe: 92 kB VmLib: 9728 kB VmPTE: 580 kB VmSwap: 636 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000400004a02 SigIgn: 0000000000001000 SigCgt: 0000000100000040 CapInh: 0000000000000000 CapPrm: 00000025402800cf CapEff: 00000025402800cf CapBnd: 00000025402800cf CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 20 Speculation_Store_Bypass: thread force mitigated SpeculationIndirectBranch: conditional force disabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 528431 nonvoluntary_ctxt_switches: 1495 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsystemd-journal\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t162\nNgid:\t104252\nPid:\t162\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t162\nNSpid:\t162\nNSpgid:\t162\nNSsid:\t162\nVmPeak:\t 426936 kB\nVmSize:\t 348768 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 283184 kB\nVmRSS:\t 221268 kB\nRssAnon:\t 540 kB\nRssFile:\t 5680 kB\nRssShmem:\t 215048 kB\nVmData:\t 8968 kB\nVmStk:\t 132 kB\nVmExe:\t 92 kB\nVmLib:\t 9728 kB\nVmPTE:\t 580 kB\nVmSwap:\t 636 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000400004a02\nSigIgn:\t0000000000001000\nSigCgt:\t0000000100000040\nCapInh:\t0000000000000000\nCapPrm:\t00000025402800cf\nCapEff:\t00000025402800cf\nCapBnd:\t00000025402800cf\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t20\nSpeculation_Store_Bypass:\tthread force mitigated\nSpeculationIndirectBranch:\tconditional force disabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t528431\nnonvoluntary_ctxt_switches:\t1495\n", error: ""} I, [2025-03-06 11:57:06 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 1749 I, [2025-03-06 11:57:06 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:06 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:06 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/1749/status I, [2025-03-06 11:57:06 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/1749/status D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: sleep Umask: 0022 State: S (sleeping) Tgid: 1749 Ngid: 0 Pid: 1749 PPid: 854 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 1 2 3 4 6 10 11 20 26 27 NStgid: 1749 888 NSpid: 1749 888 NSpgid: 854 1 NSsid: 854 1 VmPeak: 3552 kB VmSize: 1532 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 20 kB VmStk: 132 kB VmExe: 788 kB VmLib: 556 kB VmPTE: 40 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000000000 CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 1 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t1749\nNgid:\t0\nPid:\t1749\nPPid:\t854\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t1749\t888\nNSpid:\t1749\t888\nNSpgid:\t854\t1\nNSsid:\t854\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1532 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 20 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 40 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1\nnonvoluntary_ctxt_switches:\t0\n", error: ""} I, [2025-03-06 11:57:07 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 178 I, [2025-03-06 11:57:07 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:07 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/178/status I, [2025-03-06 11:57:07 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/178/status D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: containerd Umask: 0022 State: S (sleeping) Tgid: 178 Ngid: 0 Pid: 178 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 2048 Groups: NStgid: 178 NSpid: 178 NSpgid: 178 NSsid: 178 VmPeak: 7722728 kB VmSize: 7428472 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 134104 kB VmRSS: 87356 kB RssAnon: 62732 kB RssFile: 24624 kB RssShmem: 0 kB VmData: 650428 kB VmStk: 132 kB VmExe: 19352 kB VmLib: 1520 kB VmPTE: 1132 kB VmSwap: 1028 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 57 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 169 nonvoluntary_ctxt_switches: 1 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t178\nNgid:\t0\nPid:\t178\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t2048\nGroups:\t \nNStgid:\t178\nNSpid:\t178\nNSpgid:\t178\nNSsid:\t178\nVmPeak:\t 7722728 kB\nVmSize:\t 7428472 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 134104 kB\nVmRSS:\t 87356 kB\nRssAnon:\t 62732 kB\nRssFile:\t 24624 kB\nRssShmem:\t 0 kB\nVmData:\t 650428 kB\nVmStk:\t 132 kB\nVmExe:\t 19352 kB\nVmLib:\t 1520 kB\nVmPTE:\t 1132 kB\nVmSwap:\t 1028 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t57\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t169\nnonvoluntary_ctxt_switches:\t1\n", error: ""} I, [2025-03-06 11:57:07 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 284 I, [2025-03-06 11:57:07 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:07 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:07 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/284/status I, [2025-03-06 11:57:07 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/284/status D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: kubelet Umask: 0022 State: S (sleeping) Tgid: 284 Ngid: 114779 Pid: 284 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 256 Groups: NStgid: 284 NSpid: 284 NSpgid: 284 NSsid: 284 VmPeak: 8474868 kB VmSize: 8474868 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 126788 kB VmRSS: 113484 kB RssAnon: 82540 kB RssFile: 30944 kB RssShmem: 0 kB VmData: 962580 kB VmStk: 132 kB VmExe: 35216 kB VmLib: 1556 kB VmPTE: 1284 kB VmSwap: 1864 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 97 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 5932758 nonvoluntary_ctxt_switches: 7048 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tkubelet\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t284\nNgid:\t114779\nPid:\t284\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t256\nGroups:\t \nNStgid:\t284\nNSpid:\t284\nNSpgid:\t284\nNSsid:\t284\nVmPeak:\t 8474868 kB\nVmSize:\t 8474868 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 126788 kB\nVmRSS:\t 113484 kB\nRssAnon:\t 82540 kB\nRssFile:\t 30944 kB\nRssShmem:\t 0 kB\nVmData:\t 962580 kB\nVmStk:\t 132 kB\nVmExe:\t 35216 kB\nVmLib:\t 1556 kB\nVmPTE:\t 1284 kB\nVmSwap:\t 1864 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t97\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t5932758\nnonvoluntary_ctxt_switches:\t7048\n", error: ""} I, [2025-03-06 11:57:08 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3111878 I, [2025-03-06 11:57:08 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:08 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3111878/status I, [2025-03-06 11:57:08 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3111878/status D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 3111878 Ngid: 0 Pid: 3111878 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 3111878 NSpid: 3111878 NSpgid: 3111878 NSsid: 178 VmPeak: 1238568 kB VmSize: 1238568 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 15884 kB VmRSS: 15808 kB RssAnon: 4680 kB RssFile: 11128 kB RssShmem: 0 kB VmData: 45580 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 120 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 12 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 22 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111878\nNgid:\t0\nPid:\t3111878\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t3111878\nNSpid:\t3111878\nNSpgid:\t3111878\nNSsid:\t178\nVmPeak:\t 1238568 kB\nVmSize:\t 1238568 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 15884 kB\nVmRSS:\t 15808 kB\nRssAnon:\t 4680 kB\nRssFile:\t 11128 kB\nRssShmem:\t 0 kB\nVmData:\t 45580 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 120 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t22\nnonvoluntary_ctxt_switches:\t0\n", error: ""} I, [2025-03-06 11:57:08 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3111903 I, [2025-03-06 11:57:08 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:08 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:08 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3111903/status I, [2025-03-06 11:57:08 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3111903/status D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 3111903 Ngid: 0 Pid: 3111903 PPid: 3111878 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 3111903 NSpid: 3111903 NSpgid: 3111903 NSsid: 3111903 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 41 nonvoluntary_ctxt_switches: 7 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111903\nNgid:\t0\nPid:\t3111903\nPPid:\t3111878\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t3111903\nNSpid:\t3111903\nNSpgid:\t3111903\nNSsid:\t3111903\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t41\nnonvoluntary_ctxt_switches:\t7\n", error: ""} I, [2025-03-06 11:57:09 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3111937 I, [2025-03-06 11:57:09 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:09 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3111937/status I, [2025-03-06 11:57:09 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3111937/status D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: sh Umask: 0022 State: S (sleeping) Tgid: 3111937 Ngid: 0 Pid: 3111937 PPid: 3111878 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 3111937 NSpid: 3111937 NSpgid: 3111937 NSsid: 3111937 VmPeak: 2576 kB VmSize: 2576 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 928 kB VmRSS: 928 kB RssAnon: 88 kB RssFile: 840 kB RssShmem: 0 kB VmData: 232 kB VmStk: 132 kB VmExe: 76 kB VmLib: 1520 kB VmPTE: 44 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000010002 CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 61 nonvoluntary_ctxt_switches: 8 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsh\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111937\nNgid:\t0\nPid:\t3111937\nPPid:\t3111878\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t3111937\nNSpid:\t3111937\nNSpgid:\t3111937\nNSsid:\t3111937\nVmPeak:\t 2576 kB\nVmSize:\t 2576 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 928 kB\nVmRSS:\t 928 kB\nRssAnon:\t 88 kB\nRssFile:\t 840 kB\nRssShmem:\t 0 kB\nVmData:\t 232 kB\nVmStk:\t 132 kB\nVmExe:\t 76 kB\nVmLib:\t 1520 kB\nVmPTE:\t 44 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000010002\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t61\nnonvoluntary_ctxt_switches:\t8\n", error: ""} I, [2025-03-06 11:57:09 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3111957 I, [2025-03-06 11:57:09 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:09 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:09 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3111957/status I, [2025-03-06 11:57:09 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3111957/status D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: sleep Umask: 0022 State: S (sleeping) Tgid: 3111957 Ngid: 0 Pid: 3111957 PPid: 3111937 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 3111957 NSpid: 3111957 NSpgid: 3111937 NSsid: 3111937 VmPeak: 2484 kB VmSize: 2484 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 904 kB VmRSS: 904 kB RssAnon: 88 kB RssFile: 816 kB RssShmem: 0 kB VmData: 224 kB VmStk: 132 kB VmExe: 20 kB VmLib: 1520 kB VmPTE: 40 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000000000 CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 4 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111957\nNgid:\t0\nPid:\t3111957\nPPid:\t3111937\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t3111957\nNSpid:\t3111957\nNSpgid:\t3111937\nNSsid:\t3111937\nVmPeak:\t 2484 kB\nVmSize:\t 2484 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 904 kB\nVmRSS:\t 904 kB\nRssAnon:\t 88 kB\nRssFile:\t 816 kB\nRssShmem:\t 0 kB\nVmData:\t 224 kB\nVmStk:\t 132 kB\nVmExe:\t 20 kB\nVmLib:\t 1520 kB\nVmPTE:\t 40 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t4\nnonvoluntary_ctxt_switches:\t0\n", error: ""} I, [2025-03-06 11:57:10 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3112901 I, [2025-03-06 11:57:10 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:10 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3112901/status I, [2025-03-06 11:57:10 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3112901/status D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 3112901 Ngid: 0 Pid: 3112901 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 3112901 NSpid: 3112901 NSpgid: 3112901 NSsid: 178 VmPeak: 1238312 kB VmSize: 1238312 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 14684 kB VmRSS: 14680 kB RssAnon: 3828 kB RssFile: 10852 kB RssShmem: 0 kB VmData: 45324 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 116 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 11 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 9 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3112901\nNgid:\t0\nPid:\t3112901\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t3112901\nNSpid:\t3112901\nNSpgid:\t3112901\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 14684 kB\nVmRSS:\t 14680 kB\nRssAnon:\t 3828 kB\nRssFile:\t 10852 kB\nRssShmem:\t 0 kB\nVmData:\t 45324 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 116 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t11\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", error: ""} I, [2025-03-06 11:57:10 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3112926 I, [2025-03-06 11:57:10 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:10 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:10 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3112926/status I, [2025-03-06 11:57:10 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3112926/status D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 3112926 Ngid: 0 Pid: 3112926 PPid: 3112901 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 3112926 1 NSpid: 3112926 1 NSpgid: 3112926 1 NSsid: 3112926 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 29 nonvoluntary_ctxt_switches: 9 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3112926\nNgid:\t0\nPid:\t3112926\nPPid:\t3112901\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t3112926\t1\nNSpid:\t3112926\t1\nNSpgid:\t3112926\t1\nNSsid:\t3112926\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t29\nnonvoluntary_ctxt_switches:\t9\n", error: ""} I, [2025-03-06 11:57:11 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3112959 I, [2025-03-06 11:57:11 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:11 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3112959/status I, [2025-03-06 11:57:11 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3112959/status D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: chaos-operator Umask: 0022 State: S (sleeping) Tgid: 3112959 Ngid: 0 Pid: 3112959 PPid: 3112901 TracerPid: 0 Uid: 1000 1000 1000 1000 Gid: 1000 1000 1000 1000 FDSize: 64 Groups: 1000 NStgid: 3112959 1 NSpid: 3112959 1 NSpgid: 3112959 1 NSsid: 3112959 1 VmPeak: 1262700 kB VmSize: 1262700 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 38888 kB VmRSS: 38888 kB RssAnon: 15496 kB RssFile: 23392 kB RssShmem: 0 kB VmData: 63428 kB VmStk: 132 kB VmExe: 15232 kB VmLib: 8 kB VmPTE: 200 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 35 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 1134 nonvoluntary_ctxt_switches: 10 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tchaos-operator\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3112959\nNgid:\t0\nPid:\t3112959\nPPid:\t3112901\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t1000\t1000\t1000\t1000\nFDSize:\t64\nGroups:\t1000 \nNStgid:\t3112959\t1\nNSpid:\t3112959\t1\nNSpgid:\t3112959\t1\nNSsid:\t3112959\t1\nVmPeak:\t 1262700 kB\nVmSize:\t 1262700 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 38888 kB\nVmRSS:\t 38888 kB\nRssAnon:\t 15496 kB\nRssFile:\t 23392 kB\nRssShmem:\t 0 kB\nVmData:\t 63428 kB\nVmStk:\t 132 kB\nVmExe:\t 15232 kB\nVmLib:\t 8 kB\nVmPTE:\t 200 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t35\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1134\nnonvoluntary_ctxt_switches:\t10\n", error: ""} I, [2025-03-06 11:57:11 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3113360 I, [2025-03-06 11:57:11 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:11 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:11 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3113360/status I, [2025-03-06 11:57:11 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3113360/status D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 3113360 Ngid: 0 Pid: 3113360 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 3113360 NSpid: 3113360 NSpgid: 3113360 NSsid: 178 VmPeak: 1238312 kB VmSize: 1238312 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 13976 kB VmRSS: 13852 kB RssAnon: 3420 kB RssFile: 10432 kB RssShmem: 0 kB VmData: 41228 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 112 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 11 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 8 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3113360\nNgid:\t0\nPid:\t3113360\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t3113360\nNSpid:\t3113360\nNSpgid:\t3113360\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 13976 kB\nVmRSS:\t 13852 kB\nRssAnon:\t 3420 kB\nRssFile:\t 10432 kB\nRssShmem:\t 0 kB\nVmData:\t 41228 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 112 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t11\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", error: ""} I, [2025-03-06 11:57:12 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3113384 I, [2025-03-06 11:57:12 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:12 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3113384/status I, [2025-03-06 11:57:12 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3113384/status D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 3113384 Ngid: 0 Pid: 3113384 PPid: 3113360 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 3113384 1 NSpid: 3113384 1 NSpgid: 3113384 1 NSsid: 3113384 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 24 nonvoluntary_ctxt_switches: 13 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3113384\nNgid:\t0\nPid:\t3113384\nPPid:\t3113360\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t3113384\t1\nNSpid:\t3113384\t1\nNSpgid:\t3113384\t1\nNSsid:\t3113384\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t24\nnonvoluntary_ctxt_switches:\t13\n", error: ""} I, [2025-03-06 11:57:12 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3113417 I, [2025-03-06 11:57:12 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:12 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:12 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3113417/status I, [2025-03-06 11:57:12 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3113417/status D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: coredns Umask: 0022 State: S (sleeping) Tgid: 3113417 Ngid: 0 Pid: 3113417 PPid: 3113360 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 3113417 1 NSpid: 3113417 1 NSpgid: 3113417 1 NSsid: 3113417 1 VmPeak: 748492 kB VmSize: 748492 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 41412 kB VmRSS: 41412 kB RssAnon: 12648 kB RssFile: 28764 kB RssShmem: 0 kB VmData: 108680 kB VmStk: 132 kB VmExe: 22032 kB VmLib: 8 kB VmPTE: 200 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 22 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffe7fc1feff CapInh: 0000000000000000 CapPrm: 00000000a80425fb CapEff: 00000000a80425fb CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 460 nonvoluntary_ctxt_switches: 15 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcoredns\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3113417\nNgid:\t0\nPid:\t3113417\nPPid:\t3113360\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t3113417\t1\nNSpid:\t3113417\t1\nNSpgid:\t3113417\t1\nNSsid:\t3113417\t1\nVmPeak:\t 748492 kB\nVmSize:\t 748492 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 41412 kB\nVmRSS:\t 41412 kB\nRssAnon:\t 12648 kB\nRssFile:\t 28764 kB\nRssShmem:\t 0 kB\nVmData:\t 108680 kB\nVmStk:\t 132 kB\nVmExe:\t 22032 kB\nVmLib:\t 8 kB\nVmPTE:\t 200 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t22\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffe7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80425fb\nCapEff:\t00000000a80425fb\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t460\nnonvoluntary_ctxt_switches:\t15\n", error: ""} I, [2025-03-06 11:57:13 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3114203 I, [2025-03-06 11:57:13 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:13 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3114203/status I, [2025-03-06 11:57:13 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3114203/status D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: I, [2025-03-06 11:57:13 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec stderr: cat: /proc/3114203/status: No such file or directory command terminated with exit code 1 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[1], output: "", error: "cat: /proc/3114203/status: No such file or directory\ncommand terminated with exit code 1\n"} I, [2025-03-06 11:57:13 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 372 I, [2025-03-06 11:57:13 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:13 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/372/status I, [2025-03-06 11:57:13 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/372/status D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 372 Ngid: 0 Pid: 372 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 372 NSpid: 372 NSpgid: 372 NSsid: 178 VmPeak: 1238312 kB VmSize: 1238312 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 14124 kB VmRSS: 12940 kB RssAnon: 2648 kB RssFile: 10292 kB RssShmem: 0 kB VmData: 41228 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 116 kB VmSwap: 612 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 13 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 9 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t372\nNgid:\t0\nPid:\t372\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t372\nNSpid:\t372\nNSpgid:\t372\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 14124 kB\nVmRSS:\t 12940 kB\nRssAnon:\t 2648 kB\nRssFile:\t 10292 kB\nRssShmem:\t 0 kB\nVmData:\t 41228 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 116 kB\nVmSwap:\t 612 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", error: ""} I, [2025-03-06 11:57:13 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 384 I, [2025-03-06 11:57:13 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:13 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:13 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/384/status I, [2025-03-06 11:57:14 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/384/status D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 384 Ngid: 0 Pid: 384 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 384 NSpid: 384 NSpgid: 384 NSsid: 178 VmPeak: 1238312 kB VmSize: 1238312 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 14288 kB VmRSS: 13664 kB RssAnon: 3212 kB RssFile: 10452 kB RssShmem: 0 kB VmData: 45324 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 120 kB VmSwap: 504 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 13 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 8 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t384\nNgid:\t0\nPid:\t384\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t384\nNSpid:\t384\nNSpgid:\t384\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 14288 kB\nVmRSS:\t 13664 kB\nRssAnon:\t 3212 kB\nRssFile:\t 10452 kB\nRssShmem:\t 0 kB\nVmData:\t 45324 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 120 kB\nVmSwap:\t 504 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", error: ""} I, [2025-03-06 11:57:14 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 423 I, [2025-03-06 11:57:14 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:14 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/423/status I, [2025-03-06 11:57:14 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/423/status D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 423 Ngid: 0 Pid: 423 PPid: 372 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 423 1 NSpid: 423 1 NSpgid: 423 1 NSsid: 423 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 34 nonvoluntary_ctxt_switches: 8 D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t423\nNgid:\t0\nPid:\t423\nPPid:\t372\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t423\t1\nNSpid:\t423\t1\nNSpgid:\t423\t1\nNSsid:\t423\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t34\nnonvoluntary_ctxt_switches:\t8\n", error: ""} I, [2025-03-06 11:57:14 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 430 I, [2025-03-06 11:57:14 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:14 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:14 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/430/status I, [2025-03-06 11:57:15 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/430/status D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 430 Ngid: 0 Pid: 430 PPid: 384 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 430 1 NSpid: 430 1 NSpgid: 430 1 NSsid: 430 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 24 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 35 nonvoluntary_ctxt_switches: 11 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t430\nNgid:\t0\nPid:\t430\nPPid:\t384\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t430\t1\nNSpid:\t430\t1\nNSpgid:\t430\t1\nNSsid:\t430\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 24 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t35\nnonvoluntary_ctxt_switches:\t11\n", error: ""} I, [2025-03-06 11:57:15 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 479 I, [2025-03-06 11:57:15 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:15 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/479/status I, [2025-03-06 11:57:15 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/479/status D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: kube-proxy Umask: 0022 State: S (sleeping) Tgid: 479 Ngid: 331610 Pid: 479 PPid: 372 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 479 1 NSpid: 479 1 NSpgid: 479 1 NSsid: 479 1 VmPeak: 1299688 kB VmSize: 1299688 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 56656 kB VmRSS: 34240 kB RssAnon: 18436 kB RssFile: 15804 kB RssShmem: 0 kB VmData: 78976 kB VmStk: 132 kB VmExe: 30348 kB VmLib: 8 kB VmPTE: 288 kB VmSwap: 472 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 38 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 96966 nonvoluntary_ctxt_switches: 133 D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tkube-proxy\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t479\nNgid:\t331610\nPid:\t479\nPPid:\t372\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t479\t1\nNSpid:\t479\t1\nNSpgid:\t479\t1\nNSsid:\t479\t1\nVmPeak:\t 1299688 kB\nVmSize:\t 1299688 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 56656 kB\nVmRSS:\t 34240 kB\nRssAnon:\t 18436 kB\nRssFile:\t 15804 kB\nRssShmem:\t 0 kB\nVmData:\t 78976 kB\nVmStk:\t 132 kB\nVmExe:\t 30348 kB\nVmLib:\t 8 kB\nVmPTE:\t 288 kB\nVmSwap:\t 472 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t38\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t96966\nnonvoluntary_ctxt_switches:\t133\n", error: ""} I, [2025-03-06 11:57:15 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 680 I, [2025-03-06 11:57:15 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:15 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:15 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/680/status I, [2025-03-06 11:57:16 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/680/status D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: kindnetd Umask: 0022 State: S (sleeping) Tgid: 680 Ngid: 117220 Pid: 680 PPid: 384 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 680 1 NSpid: 680 1 NSpgid: 680 1 NSsid: 680 1 VmPeak: 1276212 kB VmSize: 1276212 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 40068 kB VmRSS: 24024 kB RssAnon: 13400 kB RssFile: 10624 kB RssShmem: 0 kB VmData: 67572 kB VmStk: 132 kB VmExe: 21148 kB VmLib: 8 kB VmPTE: 248 kB VmSwap: 232 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 41 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba3a00 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 00000000a80435fb CapEff: 00000000a80435fb CapBnd: 00000000a80435fb CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 1091 nonvoluntary_ctxt_switches: 18 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tkindnetd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t680\nNgid:\t117220\nPid:\t680\nPPid:\t384\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t680\t1\nNSpid:\t680\t1\nNSpgid:\t680\t1\nNSsid:\t680\t1\nVmPeak:\t 1276212 kB\nVmSize:\t 1276212 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 40068 kB\nVmRSS:\t 24024 kB\nRssAnon:\t 13400 kB\nRssFile:\t 10624 kB\nRssShmem:\t 0 kB\nVmData:\t 67572 kB\nVmStk:\t 132 kB\nVmExe:\t 21148 kB\nVmLib:\t 8 kB\nVmPTE:\t 248 kB\nVmSwap:\t 232 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t41\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80435fb\nCapEff:\t00000000a80435fb\nCapBnd:\t00000000a80435fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1091\nnonvoluntary_ctxt_switches:\t18\n", error: ""} I, [2025-03-06 11:57:16 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 793 I, [2025-03-06 11:57:16 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:16 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/793/status I, [2025-03-06 11:57:16 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/793/status D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 793 Ngid: 0 Pid: 793 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 793 NSpid: 793 NSpgid: 793 NSsid: 178 VmPeak: 1238312 kB VmSize: 1238312 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 15024 kB VmRSS: 14476 kB RssAnon: 3556 kB RssFile: 10920 kB RssShmem: 0 kB VmData: 45324 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 124 kB VmSwap: 88 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 13 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 9 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t793\nNgid:\t0\nPid:\t793\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t793\nNSpid:\t793\nNSpgid:\t793\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 15024 kB\nVmRSS:\t 14476 kB\nRssAnon:\t 3556 kB\nRssFile:\t 10920 kB\nRssShmem:\t 0 kB\nVmData:\t 45324 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 124 kB\nVmSwap:\t 88 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", error: ""} I, [2025-03-06 11:57:16 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 818 I, [2025-03-06 11:57:16 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:16 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:16 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/818/status I, [2025-03-06 11:57:17 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/818/status D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 818 Ngid: 0 Pid: 818 PPid: 793 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 818 1 NSpid: 818 1 NSpgid: 818 1 NSsid: 818 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 24 nonvoluntary_ctxt_switches: 7 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t818\nNgid:\t0\nPid:\t818\nPPid:\t793\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t818\t1\nNSpid:\t818\t1\nNSpgid:\t818\t1\nNSsid:\t818\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t24\nnonvoluntary_ctxt_switches:\t7\n", error: ""} I, [2025-03-06 11:57:17 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 854 I, [2025-03-06 11:57:17 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:17 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/854/status I, [2025-03-06 11:57:17 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/854/status D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: sh Umask: 0022 State: S (sleeping) Tgid: 854 Ngid: 0 Pid: 854 PPid: 793 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 1 2 3 4 6 10 11 20 26 27 NStgid: 854 1 NSpid: 854 1 NSpgid: 854 1 NSsid: 854 1 VmPeak: 3552 kB VmSize: 1564 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 972 kB VmRSS: 84 kB RssAnon: 80 kB RssFile: 4 kB RssShmem: 0 kB VmData: 52 kB VmStk: 132 kB VmExe: 788 kB VmLib: 556 kB VmPTE: 44 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000004 SigCgt: 0000000000010002 CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 906 nonvoluntary_ctxt_switches: 9 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsh\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t854\nNgid:\t0\nPid:\t854\nPPid:\t793\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t854\t1\nNSpid:\t854\t1\nNSpgid:\t854\t1\nNSsid:\t854\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1564 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 972 kB\nVmRSS:\t 84 kB\nRssAnon:\t 80 kB\nRssFile:\t 4 kB\nRssShmem:\t 0 kB\nVmData:\t 52 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 44 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000004\nSigCgt:\t0000000000010002\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t906\nnonvoluntary_ctxt_switches:\t9\n", error: ""} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: proc process_statuses_by_node: ["Name:\tsystemd\nUmask:\t0000\nState:\tS (sleeping)\nTgid:\t1\nNgid:\t0\nPid:\t1\nPPid:\t0\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t256\nGroups:\t \nNStgid:\t1\nNSpid:\t1\nNSpgid:\t1\nNSsid:\t1\nVmPeak:\t 35920 kB\nVmSize:\t 35800 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 25920 kB\nVmRSS:\t 25332 kB\nRssAnon:\t 18052 kB\nRssFile:\t 7280 kB\nRssShmem:\t 0 kB\nVmData:\t 16892 kB\nVmStk:\t 1040 kB\nVmExe:\t 40 kB\nVmLib:\t 10680 kB\nVmPTE:\t 112 kB\nVmSwap:\t 672 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t7fe3c0fe28014a03\nSigIgn:\t0000000000001000\nSigCgt:\t00000000000004ec\nCapInh:\t0000003fffffffff\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t854445\nnonvoluntary_ctxt_switches:\t37992\n", "Name:\tsystemd-journal\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t162\nNgid:\t104252\nPid:\t162\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t162\nNSpid:\t162\nNSpgid:\t162\nNSsid:\t162\nVmPeak:\t 426936 kB\nVmSize:\t 348768 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 283184 kB\nVmRSS:\t 221268 kB\nRssAnon:\t 540 kB\nRssFile:\t 5680 kB\nRssShmem:\t 215048 kB\nVmData:\t 8968 kB\nVmStk:\t 132 kB\nVmExe:\t 92 kB\nVmLib:\t 9728 kB\nVmPTE:\t 580 kB\nVmSwap:\t 636 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000400004a02\nSigIgn:\t0000000000001000\nSigCgt:\t0000000100000040\nCapInh:\t0000000000000000\nCapPrm:\t00000025402800cf\nCapEff:\t00000025402800cf\nCapBnd:\t00000025402800cf\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t20\nSpeculation_Store_Bypass:\tthread force mitigated\nSpeculationIndirectBranch:\tconditional force disabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t528431\nnonvoluntary_ctxt_switches:\t1495\n", "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t1749\nNgid:\t0\nPid:\t1749\nPPid:\t854\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t1749\t888\nNSpid:\t1749\t888\nNSpgid:\t854\t1\nNSsid:\t854\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1532 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 20 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 40 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tcontainerd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t178\nNgid:\t0\nPid:\t178\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t2048\nGroups:\t \nNStgid:\t178\nNSpid:\t178\nNSpgid:\t178\nNSsid:\t178\nVmPeak:\t 7722728 kB\nVmSize:\t 7428472 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 134104 kB\nVmRSS:\t 87356 kB\nRssAnon:\t 62732 kB\nRssFile:\t 24624 kB\nRssShmem:\t 0 kB\nVmData:\t 650428 kB\nVmStk:\t 132 kB\nVmExe:\t 19352 kB\nVmLib:\t 1520 kB\nVmPTE:\t 1132 kB\nVmSwap:\t 1028 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t57\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t169\nnonvoluntary_ctxt_switches:\t1\n", "Name:\tkubelet\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t284\nNgid:\t114779\nPid:\t284\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t256\nGroups:\t \nNStgid:\t284\nNSpid:\t284\nNSpgid:\t284\nNSsid:\t284\nVmPeak:\t 8474868 kB\nVmSize:\t 8474868 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 126788 kB\nVmRSS:\t 113484 kB\nRssAnon:\t 82540 kB\nRssFile:\t 30944 kB\nRssShmem:\t 0 kB\nVmData:\t 962580 kB\nVmStk:\t 132 kB\nVmExe:\t 35216 kB\nVmLib:\t 1556 kB\nVmPTE:\t 1284 kB\nVmSwap:\t 1864 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t97\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t5932758\nnonvoluntary_ctxt_switches:\t7048\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111878\nNgid:\t0\nPid:\t3111878\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t3111878\nNSpid:\t3111878\nNSpgid:\t3111878\nNSsid:\t178\nVmPeak:\t 1238568 kB\nVmSize:\t 1238568 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 15884 kB\nVmRSS:\t 15808 kB\nRssAnon:\t 4680 kB\nRssFile:\t 11128 kB\nRssShmem:\t 0 kB\nVmData:\t 45580 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 120 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t22\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111903\nNgid:\t0\nPid:\t3111903\nPPid:\t3111878\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t3111903\nNSpid:\t3111903\nNSpgid:\t3111903\nNSsid:\t3111903\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t41\nnonvoluntary_ctxt_switches:\t7\n", "Name:\tsh\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111937\nNgid:\t0\nPid:\t3111937\nPPid:\t3111878\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t3111937\nNSpid:\t3111937\nNSpgid:\t3111937\nNSsid:\t3111937\nVmPeak:\t 2576 kB\nVmSize:\t 2576 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 928 kB\nVmRSS:\t 928 kB\nRssAnon:\t 88 kB\nRssFile:\t 840 kB\nRssShmem:\t 0 kB\nVmData:\t 232 kB\nVmStk:\t 132 kB\nVmExe:\t 76 kB\nVmLib:\t 1520 kB\nVmPTE:\t 44 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000010002\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t61\nnonvoluntary_ctxt_switches:\t8\n", "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111957\nNgid:\t0\nPid:\t3111957\nPPid:\t3111937\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t3111957\nNSpid:\t3111957\nNSpgid:\t3111937\nNSsid:\t3111937\nVmPeak:\t 2484 kB\nVmSize:\t 2484 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 904 kB\nVmRSS:\t 904 kB\nRssAnon:\t 88 kB\nRssFile:\t 816 kB\nRssShmem:\t 0 kB\nVmData:\t 224 kB\nVmStk:\t 132 kB\nVmExe:\t 20 kB\nVmLib:\t 1520 kB\nVmPTE:\t 40 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t4\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3112901\nNgid:\t0\nPid:\t3112901\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t3112901\nNSpid:\t3112901\nNSpgid:\t3112901\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 14684 kB\nVmRSS:\t 14680 kB\nRssAnon:\t 3828 kB\nRssFile:\t 10852 kB\nRssShmem:\t 0 kB\nVmData:\t 45324 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 116 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t11\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3112926\nNgid:\t0\nPid:\t3112926\nPPid:\t3112901\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t3112926\t1\nNSpid:\t3112926\t1\nNSpgid:\t3112926\t1\nNSsid:\t3112926\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t29\nnonvoluntary_ctxt_switches:\t9\n", "Name:\tchaos-operator\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3112959\nNgid:\t0\nPid:\t3112959\nPPid:\t3112901\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t1000\t1000\t1000\t1000\nFDSize:\t64\nGroups:\t1000 \nNStgid:\t3112959\t1\nNSpid:\t3112959\t1\nNSpgid:\t3112959\t1\nNSsid:\t3112959\t1\nVmPeak:\t 1262700 kB\nVmSize:\t 1262700 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 38888 kB\nVmRSS:\t 38888 kB\nRssAnon:\t 15496 kB\nRssFile:\t 23392 kB\nRssShmem:\t 0 kB\nVmData:\t 63428 kB\nVmStk:\t 132 kB\nVmExe:\t 15232 kB\nVmLib:\t 8 kB\nVmPTE:\t 200 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t35\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1134\nnonvoluntary_ctxt_switches:\t10\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3113360\nNgid:\t0\nPid:\t3113360\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t3113360\nNSpid:\t3113360\nNSpgid:\t3113360\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 13976 kB\nVmRSS:\t 13852 kB\nRssAnon:\t 3420 kB\nRssFile:\t 10432 kB\nRssShmem:\t 0 kB\nVmData:\t 41228 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 112 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t11\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3113384\nNgid:\t0\nPid:\t3113384\nPPid:\t3113360\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t3113384\t1\nNSpid:\t3113384\t1\nNSpgid:\t3113384\t1\nNSsid:\t3113384\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t24\nnonvoluntary_ctxt_switches:\t13\n", "Name:\tcoredns\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3113417\nNgid:\t0\nPid:\t3113417\nPPid:\t3113360\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t3113417\t1\nNSpid:\t3113417\t1\nNSpgid:\t3113417\t1\nNSsid:\t3113417\t1\nVmPeak:\t 748492 kB\nVmSize:\t 748492 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 41412 kB\nVmRSS:\t 41412 kB\nRssAnon:\t 12648 kB\nRssFile:\t 28764 kB\nRssShmem:\t 0 kB\nVmData:\t 108680 kB\nVmStk:\t 132 kB\nVmExe:\t 22032 kB\nVmLib:\t 8 kB\nVmPTE:\t 200 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t22\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffe7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80425fb\nCapEff:\t00000000a80425fb\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t460\nnonvoluntary_ctxt_switches:\t15\n", "", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t372\nNgid:\t0\nPid:\t372\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t372\nNSpid:\t372\nNSpgid:\t372\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 14124 kB\nVmRSS:\t 12940 kB\nRssAnon:\t 2648 kB\nRssFile:\t 10292 kB\nRssShmem:\t 0 kB\nVmData:\t 41228 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 116 kB\nVmSwap:\t 612 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t384\nNgid:\t0\nPid:\t384\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t384\nNSpid:\t384\nNSpgid:\t384\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 14288 kB\nVmRSS:\t 13664 kB\nRssAnon:\t 3212 kB\nRssFile:\t 10452 kB\nRssShmem:\t 0 kB\nVmData:\t 45324 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 120 kB\nVmSwap:\t 504 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t423\nNgid:\t0\nPid:\t423\nPPid:\t372\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t423\t1\nNSpid:\t423\t1\nNSpgid:\t423\t1\nNSsid:\t423\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t34\nnonvoluntary_ctxt_switches:\t8\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t430\nNgid:\t0\nPid:\t430\nPPid:\t384\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t430\t1\nNSpid:\t430\t1\nNSpgid:\t430\t1\nNSsid:\t430\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 24 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t35\nnonvoluntary_ctxt_switches:\t11\n", "Name:\tkube-proxy\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t479\nNgid:\t331610\nPid:\t479\nPPid:\t372\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t479\t1\nNSpid:\t479\t1\nNSpgid:\t479\t1\nNSsid:\t479\t1\nVmPeak:\t 1299688 kB\nVmSize:\t 1299688 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 56656 kB\nVmRSS:\t 34240 kB\nRssAnon:\t 18436 kB\nRssFile:\t 15804 kB\nRssShmem:\t 0 kB\nVmData:\t 78976 kB\nVmStk:\t 132 kB\nVmExe:\t 30348 kB\nVmLib:\t 8 kB\nVmPTE:\t 288 kB\nVmSwap:\t 472 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t38\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t96966\nnonvoluntary_ctxt_switches:\t133\n", "Name:\tkindnetd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t680\nNgid:\t117220\nPid:\t680\nPPid:\t384\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t680\t1\nNSpid:\t680\t1\nNSpgid:\t680\t1\nNSsid:\t680\t1\nVmPeak:\t 1276212 kB\nVmSize:\t 1276212 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 40068 kB\nVmRSS:\t 24024 kB\nRssAnon:\t 13400 kB\nRssFile:\t 10624 kB\nRssShmem:\t 0 kB\nVmData:\t 67572 kB\nVmStk:\t 132 kB\nVmExe:\t 21148 kB\nVmLib:\t 8 kB\nVmPTE:\t 248 kB\nVmSwap:\t 232 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t41\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80435fb\nCapEff:\t00000000a80435fb\nCapBnd:\t00000000a80435fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1091\nnonvoluntary_ctxt_switches:\t18\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t793\nNgid:\t0\nPid:\t793\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t793\nNSpid:\t793\nNSpgid:\t793\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 15024 kB\nVmRSS:\t 14476 kB\nRssAnon:\t 3556 kB\nRssFile:\t 10920 kB\nRssShmem:\t 0 kB\nVmData:\t 45324 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 124 kB\nVmSwap:\t 88 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t818\nNgid:\t0\nPid:\t818\nPPid:\t793\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t818\t1\nNSpid:\t818\t1\nNSpgid:\t818\t1\nNSsid:\t818\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t24\nnonvoluntary_ctxt_switches:\t7\n", "Name:\tsh\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t854\nNgid:\t0\nPid:\t854\nPPid:\t793\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t854\t1\nNSpid:\t854\t1\nNSpgid:\t854\t1\nNSsid:\t854\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1564 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 972 kB\nVmRSS:\t 84 kB\nRssAnon:\t 80 kB\nRssFile:\t 4 kB\nRssShmem:\t 0 kB\nVmData:\t 52 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 44 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000004\nSigCgt:\t0000000000010002\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t906\nnonvoluntary_ctxt_switches:\t9\n"] I, [2025-03-06 11:57:17 UTC #1422] INFO -- cnf-testsuite-proctree_by_pid: proctree_by_pid potential_parent_pid: 3113417 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: proc_statuses: ["Name:\tsystemd\nUmask:\t0000\nState:\tS (sleeping)\nTgid:\t1\nNgid:\t0\nPid:\t1\nPPid:\t0\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t256\nGroups:\t \nNStgid:\t1\nNSpid:\t1\nNSpgid:\t1\nNSsid:\t1\nVmPeak:\t 35920 kB\nVmSize:\t 35800 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 25920 kB\nVmRSS:\t 25332 kB\nRssAnon:\t 18052 kB\nRssFile:\t 7280 kB\nRssShmem:\t 0 kB\nVmData:\t 16892 kB\nVmStk:\t 1040 kB\nVmExe:\t 40 kB\nVmLib:\t 10680 kB\nVmPTE:\t 112 kB\nVmSwap:\t 672 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t7fe3c0fe28014a03\nSigIgn:\t0000000000001000\nSigCgt:\t00000000000004ec\nCapInh:\t0000003fffffffff\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t854445\nnonvoluntary_ctxt_switches:\t37992\n", "Name:\tsystemd-journal\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t162\nNgid:\t104252\nPid:\t162\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t162\nNSpid:\t162\nNSpgid:\t162\nNSsid:\t162\nVmPeak:\t 426936 kB\nVmSize:\t 348768 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 283184 kB\nVmRSS:\t 221268 kB\nRssAnon:\t 540 kB\nRssFile:\t 5680 kB\nRssShmem:\t 215048 kB\nVmData:\t 8968 kB\nVmStk:\t 132 kB\nVmExe:\t 92 kB\nVmLib:\t 9728 kB\nVmPTE:\t 580 kB\nVmSwap:\t 636 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000400004a02\nSigIgn:\t0000000000001000\nSigCgt:\t0000000100000040\nCapInh:\t0000000000000000\nCapPrm:\t00000025402800cf\nCapEff:\t00000025402800cf\nCapBnd:\t00000025402800cf\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t20\nSpeculation_Store_Bypass:\tthread force mitigated\nSpeculationIndirectBranch:\tconditional force disabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t528431\nnonvoluntary_ctxt_switches:\t1495\n", "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t1749\nNgid:\t0\nPid:\t1749\nPPid:\t854\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t1749\t888\nNSpid:\t1749\t888\nNSpgid:\t854\t1\nNSsid:\t854\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1532 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 20 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 40 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tcontainerd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t178\nNgid:\t0\nPid:\t178\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t2048\nGroups:\t \nNStgid:\t178\nNSpid:\t178\nNSpgid:\t178\nNSsid:\t178\nVmPeak:\t 7722728 kB\nVmSize:\t 7428472 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 134104 kB\nVmRSS:\t 87356 kB\nRssAnon:\t 62732 kB\nRssFile:\t 24624 kB\nRssShmem:\t 0 kB\nVmData:\t 650428 kB\nVmStk:\t 132 kB\nVmExe:\t 19352 kB\nVmLib:\t 1520 kB\nVmPTE:\t 1132 kB\nVmSwap:\t 1028 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t57\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t169\nnonvoluntary_ctxt_switches:\t1\n", "Name:\tkubelet\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t284\nNgid:\t114779\nPid:\t284\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t256\nGroups:\t \nNStgid:\t284\nNSpid:\t284\nNSpgid:\t284\nNSsid:\t284\nVmPeak:\t 8474868 kB\nVmSize:\t 8474868 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 126788 kB\nVmRSS:\t 113484 kB\nRssAnon:\t 82540 kB\nRssFile:\t 30944 kB\nRssShmem:\t 0 kB\nVmData:\t 962580 kB\nVmStk:\t 132 kB\nVmExe:\t 35216 kB\nVmLib:\t 1556 kB\nVmPTE:\t 1284 kB\nVmSwap:\t 1864 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t97\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t5932758\nnonvoluntary_ctxt_switches:\t7048\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111878\nNgid:\t0\nPid:\t3111878\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t3111878\nNSpid:\t3111878\nNSpgid:\t3111878\nNSsid:\t178\nVmPeak:\t 1238568 kB\nVmSize:\t 1238568 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 15884 kB\nVmRSS:\t 15808 kB\nRssAnon:\t 4680 kB\nRssFile:\t 11128 kB\nRssShmem:\t 0 kB\nVmData:\t 45580 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 120 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t22\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111903\nNgid:\t0\nPid:\t3111903\nPPid:\t3111878\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t3111903\nNSpid:\t3111903\nNSpgid:\t3111903\nNSsid:\t3111903\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t41\nnonvoluntary_ctxt_switches:\t7\n", "Name:\tsh\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111937\nNgid:\t0\nPid:\t3111937\nPPid:\t3111878\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t3111937\nNSpid:\t3111937\nNSpgid:\t3111937\nNSsid:\t3111937\nVmPeak:\t 2576 kB\nVmSize:\t 2576 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 928 kB\nVmRSS:\t 928 kB\nRssAnon:\t 88 kB\nRssFile:\t 840 kB\nRssShmem:\t 0 kB\nVmData:\t 232 kB\nVmStk:\t 132 kB\nVmExe:\t 76 kB\nVmLib:\t 1520 kB\nVmPTE:\t 44 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000010002\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t61\nnonvoluntary_ctxt_switches:\t8\n", "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111957\nNgid:\t0\nPid:\t3111957\nPPid:\t3111937\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t3111957\nNSpid:\t3111957\nNSpgid:\t3111937\nNSsid:\t3111937\nVmPeak:\t 2484 kB\nVmSize:\t 2484 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 904 kB\nVmRSS:\t 904 kB\nRssAnon:\t 88 kB\nRssFile:\t 816 kB\nRssShmem:\t 0 kB\nVmData:\t 224 kB\nVmStk:\t 132 kB\nVmExe:\t 20 kB\nVmLib:\t 1520 kB\nVmPTE:\t 40 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t4\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3112901\nNgid:\t0\nPid:\t3112901\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t3112901\nNSpid:\t3112901\nNSpgid:\t3112901\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 14684 kB\nVmRSS:\t 14680 kB\nRssAnon:\t 3828 kB\nRssFile:\t 10852 kB\nRssShmem:\t 0 kB\nVmData:\t 45324 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 116 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t11\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3112926\nNgid:\t0\nPid:\t3112926\nPPid:\t3112901\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t3112926\t1\nNSpid:\t3112926\t1\nNSpgid:\t3112926\t1\nNSsid:\t3112926\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t29\nnonvoluntary_ctxt_switches:\t9\n", "Name:\tchaos-operator\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3112959\nNgid:\t0\nPid:\t3112959\nPPid:\t3112901\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t1000\t1000\t1000\t1000\nFDSize:\t64\nGroups:\t1000 \nNStgid:\t3112959\t1\nNSpid:\t3112959\t1\nNSpgid:\t3112959\t1\nNSsid:\t3112959\t1\nVmPeak:\t 1262700 kB\nVmSize:\t 1262700 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 38888 kB\nVmRSS:\t 38888 kB\nRssAnon:\t 15496 kB\nRssFile:\t 23392 kB\nRssShmem:\t 0 kB\nVmData:\t 63428 kB\nVmStk:\t 132 kB\nVmExe:\t 15232 kB\nVmLib:\t 8 kB\nVmPTE:\t 200 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t35\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1134\nnonvoluntary_ctxt_switches:\t10\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3113360\nNgid:\t0\nPid:\t3113360\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t3113360\nNSpid:\t3113360\nNSpgid:\t3113360\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 13976 kB\nVmRSS:\t 13852 kB\nRssAnon:\t 3420 kB\nRssFile:\t 10432 kB\nRssShmem:\t 0 kB\nVmData:\t 41228 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 112 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t11\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3113384\nNgid:\t0\nPid:\t3113384\nPPid:\t3113360\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t3113384\t1\nNSpid:\t3113384\t1\nNSpgid:\t3113384\t1\nNSsid:\t3113384\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t24\nnonvoluntary_ctxt_switches:\t13\n", "Name:\tcoredns\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3113417\nNgid:\t0\nPid:\t3113417\nPPid:\t3113360\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t3113417\t1\nNSpid:\t3113417\t1\nNSpgid:\t3113417\t1\nNSsid:\t3113417\t1\nVmPeak:\t 748492 kB\nVmSize:\t 748492 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 41412 kB\nVmRSS:\t 41412 kB\nRssAnon:\t 12648 kB\nRssFile:\t 28764 kB\nRssShmem:\t 0 kB\nVmData:\t 108680 kB\nVmStk:\t 132 kB\nVmExe:\t 22032 kB\nVmLib:\t 8 kB\nVmPTE:\t 200 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t22\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffe7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80425fb\nCapEff:\t00000000a80425fb\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t460\nnonvoluntary_ctxt_switches:\t15\n", "", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t372\nNgid:\t0\nPid:\t372\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t372\nNSpid:\t372\nNSpgid:\t372\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 14124 kB\nVmRSS:\t 12940 kB\nRssAnon:\t 2648 kB\nRssFile:\t 10292 kB\nRssShmem:\t 0 kB\nVmData:\t 41228 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 116 kB\nVmSwap:\t 612 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t384\nNgid:\t0\nPid:\t384\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t384\nNSpid:\t384\nNSpgid:\t384\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 14288 kB\nVmRSS:\t 13664 kB\nRssAnon:\t 3212 kB\nRssFile:\t 10452 kB\nRssShmem:\t 0 kB\nVmData:\t 45324 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 120 kB\nVmSwap:\t 504 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t423\nNgid:\t0\nPid:\t423\nPPid:\t372\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t423\t1\nNSpid:\t423\t1\nNSpgid:\t423\t1\nNSsid:\t423\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t34\nnonvoluntary_ctxt_switches:\t8\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t430\nNgid:\t0\nPid:\t430\nPPid:\t384\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t430\t1\nNSpid:\t430\t1\nNSpgid:\t430\t1\nNSsid:\t430\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 24 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t35\nnonvoluntary_ctxt_switches:\t11\n", "Name:\tkube-proxy\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t479\nNgid:\t331610\nPid:\t479\nPPid:\t372\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t479\t1\nNSpid:\t479\t1\nNSpgid:\t479\t1\nNSsid:\t479\t1\nVmPeak:\t 1299688 kB\nVmSize:\t 1299688 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 56656 kB\nVmRSS:\t 34240 kB\nRssAnon:\t 18436 kB\nRssFile:\t 15804 kB\nRssShmem:\t 0 kB\nVmData:\t 78976 kB\nVmStk:\t 132 kB\nVmExe:\t 30348 kB\nVmLib:\t 8 kB\nVmPTE:\t 288 kB\nVmSwap:\t 472 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t38\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t96966\nnonvoluntary_ctxt_switches:\t133\n", "Name:\tkindnetd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t680\nNgid:\t117220\nPid:\t680\nPPid:\t384\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t680\t1\nNSpid:\t680\t1\nNSpgid:\t680\t1\nNSsid:\t680\t1\nVmPeak:\t 1276212 kB\nVmSize:\t 1276212 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 40068 kB\nVmRSS:\t 24024 kB\nRssAnon:\t 13400 kB\nRssFile:\t 10624 kB\nRssShmem:\t 0 kB\nVmData:\t 67572 kB\nVmStk:\t 132 kB\nVmExe:\t 21148 kB\nVmLib:\t 8 kB\nVmPTE:\t 248 kB\nVmSwap:\t 232 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t41\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80435fb\nCapEff:\t00000000a80435fb\nCapBnd:\t00000000a80435fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1091\nnonvoluntary_ctxt_switches:\t18\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t793\nNgid:\t0\nPid:\t793\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t793\nNSpid:\t793\nNSpgid:\t793\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 15024 kB\nVmRSS:\t 14476 kB\nRssAnon:\t 3556 kB\nRssFile:\t 10920 kB\nRssShmem:\t 0 kB\nVmData:\t 45324 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 124 kB\nVmSwap:\t 88 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t818\nNgid:\t0\nPid:\t818\nPPid:\t793\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t818\t1\nNSpid:\t818\t1\nNSpgid:\t818\t1\nNSsid:\t818\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t24\nnonvoluntary_ctxt_switches:\t7\n", "Name:\tsh\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t854\nNgid:\t0\nPid:\t854\nPPid:\t793\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t854\t1\nNSpid:\t854\t1\nNSpgid:\t854\t1\nNSsid:\t854\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1564 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 972 kB\nVmRSS:\t 84 kB\nRssAnon:\t 80 kB\nRssFile:\t 4 kB\nRssShmem:\t 0 kB\nVmData:\t 52 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 44 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000004\nSigCgt:\t0000000000010002\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t906\nnonvoluntary_ctxt_switches:\t9\n"] D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: systemd Umask: 0000 State: S (sleeping) Tgid: 1 Ngid: 0 Pid: 1 PPid: 0 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 256 Groups: NStgid: 1 NSpid: 1 NSpgid: 1 NSsid: 1 VmPeak: 35920 kB VmSize: 35800 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 25920 kB VmRSS: 25332 kB RssAnon: 18052 kB RssFile: 7280 kB RssShmem: 0 kB VmData: 16892 kB VmStk: 1040 kB VmExe: 40 kB VmLib: 10680 kB VmPTE: 112 kB VmSwap: 672 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 7fe3c0fe28014a03 SigIgn: 0000000000001000 SigCgt: 00000000000004ec CapInh: 0000003fffffffff CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 854445 nonvoluntary_ctxt_switches: 37992 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "systemd", "Umask" => "0000", "State" => "S (sleeping)", "Tgid" => "1", "Ngid" => "0", "Pid" => "1", "PPid" => "0", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "256", "Groups" => "", "NStgid" => "1", "NSpid" => "1", "NSpgid" => "1", "NSsid" => "1", "VmPeak" => "35920 kB", "VmSize" => "35800 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "25920 kB", "VmRSS" => "25332 kB", "RssAnon" => "18052 kB", "RssFile" => "7280 kB", "RssShmem" => "0 kB", "VmData" => "16892 kB", "VmStk" => "1040 kB", "VmExe" => "40 kB", "VmLib" => "10680 kB", "VmPTE" => "112 kB", "VmSwap" => "672 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "7fe3c0fe28014a03", "SigIgn" => "0000000000001000", "SigCgt" => "00000000000004ec", "CapInh" => "0000003fffffffff", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "854445", "nonvoluntary_ctxt_switches" => "37992"} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: systemd-journal Umask: 0022 State: S (sleeping) Tgid: 162 Ngid: 104252 Pid: 162 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 162 NSpid: 162 NSpgid: 162 NSsid: 162 VmPeak: 426936 kB VmSize: 348768 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 283184 kB VmRSS: 221268 kB RssAnon: 540 kB RssFile: 5680 kB RssShmem: 215048 kB VmData: 8968 kB VmStk: 132 kB VmExe: 92 kB VmLib: 9728 kB VmPTE: 580 kB VmSwap: 636 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000400004a02 SigIgn: 0000000000001000 SigCgt: 0000000100000040 CapInh: 0000000000000000 CapPrm: 00000025402800cf CapEff: 00000025402800cf CapBnd: 00000025402800cf CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 20 Speculation_Store_Bypass: thread force mitigated SpeculationIndirectBranch: conditional force disabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 528431 nonvoluntary_ctxt_switches: 1495 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "systemd-journal", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "162", "Ngid" => "104252", "Pid" => "162", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "", "NStgid" => "162", "NSpid" => "162", "NSpgid" => "162", "NSsid" => "162", "VmPeak" => "426936 kB", "VmSize" => "348768 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "283184 kB", "VmRSS" => "221268 kB", "RssAnon" => "540 kB", "RssFile" => "5680 kB", "RssShmem" => "215048 kB", "VmData" => "8968 kB", "VmStk" => "132 kB", "VmExe" => "92 kB", "VmLib" => "9728 kB", "VmPTE" => "580 kB", "VmSwap" => "636 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000400004a02", "SigIgn" => "0000000000001000", "SigCgt" => "0000000100000040", "CapInh" => "0000000000000000", "CapPrm" => "00000025402800cf", "CapEff" => "00000025402800cf", "CapBnd" => "00000025402800cf", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "2", "Seccomp_filters" => "20", "Speculation_Store_Bypass" => "thread force mitigated", "SpeculationIndirectBranch" => "conditional force disabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "528431", "nonvoluntary_ctxt_switches" => "1495"} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: sleep Umask: 0022 State: S (sleeping) Tgid: 1749 Ngid: 0 Pid: 1749 PPid: 854 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 1 2 3 4 6 10 11 20 26 27 NStgid: 1749 888 NSpid: 1749 888 NSpgid: 854 1 NSsid: 854 1 VmPeak: 3552 kB VmSize: 1532 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 20 kB VmStk: 132 kB VmExe: 788 kB VmLib: 556 kB VmPTE: 40 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000000000 CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 1 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "sleep", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "1749", "Ngid" => "0", "Pid" => "1749", "PPid" => "854", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0 1 2 3 4 6 10 11 20 26 27", "NStgid" => "1749\t888", "NSpid" => "1749\t888", "NSpgid" => "854\t1", "NSsid" => "854\t1", "VmPeak" => "3552 kB", "VmSize" => "1532 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "20 kB", "VmStk" => "132 kB", "VmExe" => "788 kB", "VmLib" => "556 kB", "VmPTE" => "40 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000000000", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "1", "nonvoluntary_ctxt_switches" => "0"} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: containerd Umask: 0022 State: S (sleeping) Tgid: 178 Ngid: 0 Pid: 178 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 2048 Groups: NStgid: 178 NSpid: 178 NSpgid: 178 NSsid: 178 VmPeak: 7722728 kB VmSize: 7428472 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 134104 kB VmRSS: 87356 kB RssAnon: 62732 kB RssFile: 24624 kB RssShmem: 0 kB VmData: 650428 kB VmStk: 132 kB VmExe: 19352 kB VmLib: 1520 kB VmPTE: 1132 kB VmSwap: 1028 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 57 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 169 nonvoluntary_ctxt_switches: 1 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "containerd", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "178", "Ngid" => "0", "Pid" => "178", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "2048", "Groups" => "", "NStgid" => "178", "NSpid" => "178", "NSpgid" => "178", "NSsid" => "178", "VmPeak" => "7722728 kB", "VmSize" => "7428472 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "134104 kB", "VmRSS" => "87356 kB", "RssAnon" => "62732 kB", "RssFile" => "24624 kB", "RssShmem" => "0 kB", "VmData" => "650428 kB", "VmStk" => "132 kB", "VmExe" => "19352 kB", "VmLib" => "1520 kB", "VmPTE" => "1132 kB", "VmSwap" => "1028 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "57", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "169", "nonvoluntary_ctxt_switches" => "1"} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: kubelet Umask: 0022 State: S (sleeping) Tgid: 284 Ngid: 114779 Pid: 284 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 256 Groups: NStgid: 284 NSpid: 284 NSpgid: 284 NSsid: 284 VmPeak: 8474868 kB VmSize: 8474868 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 126788 kB VmRSS: 113484 kB RssAnon: 82540 kB RssFile: 30944 kB RssShmem: 0 kB VmData: 962580 kB VmStk: 132 kB VmExe: 35216 kB VmLib: 1556 kB VmPTE: 1284 kB VmSwap: 1864 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 97 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 5932758 nonvoluntary_ctxt_switches: 7048 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "kubelet", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "284", "Ngid" => "114779", "Pid" => "284", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "256", "Groups" => "", "NStgid" => "284", "NSpid" => "284", "NSpgid" => "284", "NSsid" => "284", "VmPeak" => "8474868 kB", "VmSize" => "8474868 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "126788 kB", "VmRSS" => "113484 kB", "RssAnon" => "82540 kB", "RssFile" => "30944 kB", "RssShmem" => "0 kB", "VmData" => "962580 kB", "VmStk" => "132 kB", "VmExe" => "35216 kB", "VmLib" => "1556 kB", "VmPTE" => "1284 kB", "VmSwap" => "1864 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "97", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "5932758", "nonvoluntary_ctxt_switches" => "7048"} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 3111878 Ngid: 0 Pid: 3111878 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 3111878 NSpid: 3111878 NSpgid: 3111878 NSsid: 178 VmPeak: 1238568 kB VmSize: 1238568 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 15884 kB VmRSS: 15808 kB RssAnon: 4680 kB RssFile: 11128 kB RssShmem: 0 kB VmData: 45580 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 120 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 12 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 22 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3111878", "Ngid" => "0", "Pid" => "3111878", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "", "NStgid" => "3111878", "NSpid" => "3111878", "NSpgid" => "3111878", "NSsid" => "178", "VmPeak" => "1238568 kB", "VmSize" => "1238568 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "15884 kB", "VmRSS" => "15808 kB", "RssAnon" => "4680 kB", "RssFile" => "11128 kB", "RssShmem" => "0 kB", "VmData" => "45580 kB", "VmStk" => "132 kB", "VmExe" => "5628 kB", "VmLib" => "8 kB", "VmPTE" => "120 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "12", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "22", "nonvoluntary_ctxt_switches" => "0"} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 3111903 Ngid: 0 Pid: 3111903 PPid: 3111878 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 3111903 NSpid: 3111903 NSpgid: 3111903 NSsid: 3111903 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 41 nonvoluntary_ctxt_switches: 7 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3111903", "Ngid" => "0", "Pid" => "3111903", "PPid" => "3111878", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "3111903", "NSpid" => "3111903", "NSpgid" => "3111903", "NSsid" => "3111903", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "28 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "41", "nonvoluntary_ctxt_switches" => "7"} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: sh Umask: 0022 State: S (sleeping) Tgid: 3111937 Ngid: 0 Pid: 3111937 PPid: 3111878 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 3111937 NSpid: 3111937 NSpgid: 3111937 NSsid: 3111937 VmPeak: 2576 kB VmSize: 2576 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 928 kB VmRSS: 928 kB RssAnon: 88 kB RssFile: 840 kB RssShmem: 0 kB VmData: 232 kB VmStk: 132 kB VmExe: 76 kB VmLib: 1520 kB VmPTE: 44 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000010002 CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 61 nonvoluntary_ctxt_switches: 8 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "sh", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3111937", "Ngid" => "0", "Pid" => "3111937", "PPid" => "3111878", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "3111937", "NSpid" => "3111937", "NSpgid" => "3111937", "NSsid" => "3111937", "VmPeak" => "2576 kB", "VmSize" => "2576 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "928 kB", "VmRSS" => "928 kB", "RssAnon" => "88 kB", "RssFile" => "840 kB", "RssShmem" => "0 kB", "VmData" => "232 kB", "VmStk" => "132 kB", "VmExe" => "76 kB", "VmLib" => "1520 kB", "VmPTE" => "44 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000010002", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "61", "nonvoluntary_ctxt_switches" => "8"} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: sleep Umask: 0022 State: S (sleeping) Tgid: 3111957 Ngid: 0 Pid: 3111957 PPid: 3111937 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 3111957 NSpid: 3111957 NSpgid: 3111937 NSsid: 3111937 VmPeak: 2484 kB VmSize: 2484 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 904 kB VmRSS: 904 kB RssAnon: 88 kB RssFile: 816 kB RssShmem: 0 kB VmData: 224 kB VmStk: 132 kB VmExe: 20 kB VmLib: 1520 kB VmPTE: 40 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000000000 CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 4 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "sleep", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3111957", "Ngid" => "0", "Pid" => "3111957", "PPid" => "3111937", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "3111957", "NSpid" => "3111957", "NSpgid" => "3111937", "NSsid" => "3111937", "VmPeak" => "2484 kB", "VmSize" => "2484 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "904 kB", "VmRSS" => "904 kB", "RssAnon" => "88 kB", "RssFile" => "816 kB", "RssShmem" => "0 kB", "VmData" => "224 kB", "VmStk" => "132 kB", "VmExe" => "20 kB", "VmLib" => "1520 kB", "VmPTE" => "40 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000000000", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "4", "nonvoluntary_ctxt_switches" => "0"} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 3112901 Ngid: 0 Pid: 3112901 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 3112901 NSpid: 3112901 NSpgid: 3112901 NSsid: 178 VmPeak: 1238312 kB VmSize: 1238312 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 14684 kB VmRSS: 14680 kB RssAnon: 3828 kB RssFile: 10852 kB RssShmem: 0 kB VmData: 45324 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 116 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 11 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 9 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3112901", "Ngid" => "0", "Pid" => "3112901", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "", "NStgid" => "3112901", "NSpid" => "3112901", "NSpgid" => "3112901", "NSsid" => "178", "VmPeak" => "1238312 kB", "VmSize" => "1238312 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "14684 kB", "VmRSS" => "14680 kB", "RssAnon" => "3828 kB", "RssFile" => "10852 kB", "RssShmem" => "0 kB", "VmData" => "45324 kB", "VmStk" => "132 kB", "VmExe" => "5628 kB", "VmLib" => "8 kB", "VmPTE" => "116 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "11", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "9", "nonvoluntary_ctxt_switches" => "0"} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 3112926 Ngid: 0 Pid: 3112926 PPid: 3112901 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 3112926 1 NSpid: 3112926 1 NSpgid: 3112926 1 NSsid: 3112926 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 29 nonvoluntary_ctxt_switches: 9 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3112926", "Ngid" => "0", "Pid" => "3112926", "PPid" => "3112901", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "3112926\t1", "NSpid" => "3112926\t1", "NSpgid" => "3112926\t1", "NSsid" => "3112926\t1", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "28 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "2", "Seccomp_filters" => "1", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "29", "nonvoluntary_ctxt_switches" => "9"} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: chaos-operator Umask: 0022 State: S (sleeping) Tgid: 3112959 Ngid: 0 Pid: 3112959 PPid: 3112901 TracerPid: 0 Uid: 1000 1000 1000 1000 Gid: 1000 1000 1000 1000 FDSize: 64 Groups: 1000 NStgid: 3112959 1 NSpid: 3112959 1 NSpgid: 3112959 1 NSsid: 3112959 1 VmPeak: 1262700 kB VmSize: 1262700 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 38888 kB VmRSS: 38888 kB RssAnon: 15496 kB RssFile: 23392 kB RssShmem: 0 kB VmData: 63428 kB VmStk: 132 kB VmExe: 15232 kB VmLib: 8 kB VmPTE: 200 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 35 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 1134 nonvoluntary_ctxt_switches: 10 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "chaos-operator", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3112959", "Ngid" => "0", "Pid" => "3112959", "PPid" => "3112901", "TracerPid" => "0", "Uid" => "1000\t1000\t1000\t1000", "Gid" => "1000\t1000\t1000\t1000", "FDSize" => "64", "Groups" => "1000", "NStgid" => "3112959\t1", "NSpid" => "3112959\t1", "NSpgid" => "3112959\t1", "NSsid" => "3112959\t1", "VmPeak" => "1262700 kB", "VmSize" => "1262700 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "38888 kB", "VmRSS" => "38888 kB", "RssAnon" => "15496 kB", "RssFile" => "23392 kB", "RssShmem" => "0 kB", "VmData" => "63428 kB", "VmStk" => "132 kB", "VmExe" => "15232 kB", "VmLib" => "8 kB", "VmPTE" => "200 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "35", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "1134", "nonvoluntary_ctxt_switches" => "10"} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 3113360 Ngid: 0 Pid: 3113360 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 3113360 NSpid: 3113360 NSpgid: 3113360 NSsid: 178 VmPeak: 1238312 kB VmSize: 1238312 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 13976 kB VmRSS: 13852 kB RssAnon: 3420 kB RssFile: 10432 kB RssShmem: 0 kB VmData: 41228 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 112 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 11 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 8 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3113360", "Ngid" => "0", "Pid" => "3113360", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "", "NStgid" => "3113360", "NSpid" => "3113360", "NSpgid" => "3113360", "NSsid" => "178", "VmPeak" => "1238312 kB", "VmSize" => "1238312 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "13976 kB", "VmRSS" => "13852 kB", "RssAnon" => "3420 kB", "RssFile" => "10432 kB", "RssShmem" => "0 kB", "VmData" => "41228 kB", "VmStk" => "132 kB", "VmExe" => "5628 kB", "VmLib" => "8 kB", "VmPTE" => "112 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "11", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "8", "nonvoluntary_ctxt_switches" => "0"} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 3113384 Ngid: 0 Pid: 3113384 PPid: 3113360 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 3113384 1 NSpid: 3113384 1 NSpgid: 3113384 1 NSsid: 3113384 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 24 nonvoluntary_ctxt_switches: 13 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3113384", "Ngid" => "0", "Pid" => "3113384", "PPid" => "3113360", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "3113384\t1", "NSpid" => "3113384\t1", "NSpgid" => "3113384\t1", "NSsid" => "3113384\t1", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "28 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "2", "Seccomp_filters" => "1", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "24", "nonvoluntary_ctxt_switches" => "13"} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: coredns Umask: 0022 State: S (sleeping) Tgid: 3113417 Ngid: 0 Pid: 3113417 PPid: 3113360 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 3113417 1 NSpid: 3113417 1 NSpgid: 3113417 1 NSsid: 3113417 1 VmPeak: 748492 kB VmSize: 748492 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 41412 kB VmRSS: 41412 kB RssAnon: 12648 kB RssFile: 28764 kB RssShmem: 0 kB VmData: 108680 kB VmStk: 132 kB VmExe: 22032 kB VmLib: 8 kB VmPTE: 200 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 22 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffe7fc1feff CapInh: 0000000000000000 CapPrm: 00000000a80425fb CapEff: 00000000a80425fb CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 460 nonvoluntary_ctxt_switches: 15 D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "coredns", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3113417", "Ngid" => "0", "Pid" => "3113417", "PPid" => "3113360", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "3113417\t1", "NSpid" => "3113417\t1", "NSpgid" => "3113417\t1", "NSsid" => "3113417\t1", "VmPeak" => "748492 kB", "VmSize" => "748492 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "41412 kB", "VmRSS" => "41412 kB", "RssAnon" => "12648 kB", "RssFile" => "28764 kB", "RssShmem" => "0 kB", "VmData" => "108680 kB", "VmStk" => "132 kB", "VmExe" => "22032 kB", "VmLib" => "8 kB", "VmPTE" => "200 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "22", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffe7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "00000000a80425fb", "CapEff" => "00000000a80425fb", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "460", "nonvoluntary_ctxt_switches" => "15"} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: I, [2025-03-06 11:57:17 UTC #1422] INFO -- cnf-testsuite: cmdline_by_pid I, [2025-03-06 11:57:17 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:17 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:17 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3113417/cmdline I, [2025-03-06 11:57:18 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3113417/cmdline D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: /coredns-conf/etc/coredns/Corefile D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000", error: ""} I, [2025-03-06 11:57:18 UTC #1422] INFO -- cnf-testsuite: cmdline_by_node cmdline: {status: Process::Status[0], output: "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000", error: ""} D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: current_pid == potential_parent_pid D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 372 Ngid: 0 Pid: 372 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 372 NSpid: 372 NSpgid: 372 NSsid: 178 VmPeak: 1238312 kB VmSize: 1238312 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 14124 kB VmRSS: 12940 kB RssAnon: 2648 kB RssFile: 10292 kB RssShmem: 0 kB VmData: 41228 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 116 kB VmSwap: 612 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 13 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 9 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "372", "Ngid" => "0", "Pid" => "372", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "", "NStgid" => "372", "NSpid" => "372", "NSpgid" => "372", "NSsid" => "178", "VmPeak" => "1238312 kB", "VmSize" => "1238312 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "14124 kB", "VmRSS" => "12940 kB", "RssAnon" => "2648 kB", "RssFile" => "10292 kB", "RssShmem" => "0 kB", "VmData" => "41228 kB", "VmStk" => "132 kB", "VmExe" => "5628 kB", "VmLib" => "8 kB", "VmPTE" => "116 kB", "VmSwap" => "612 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "13", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "9", "nonvoluntary_ctxt_switches" => "0"} D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 384 Ngid: 0 Pid: 384 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 384 NSpid: 384 NSpgid: 384 NSsid: 178 VmPeak: 1238312 kB VmSize: 1238312 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 14288 kB VmRSS: 13664 kB RssAnon: 3212 kB RssFile: 10452 kB RssShmem: 0 kB VmData: 45324 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 120 kB VmSwap: 504 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 13 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 8 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "384", "Ngid" => "0", "Pid" => "384", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "", "NStgid" => "384", "NSpid" => "384", "NSpgid" => "384", "NSsid" => "178", "VmPeak" => "1238312 kB", "VmSize" => "1238312 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "14288 kB", "VmRSS" => "13664 kB", "RssAnon" => "3212 kB", "RssFile" => "10452 kB", "RssShmem" => "0 kB", "VmData" => "45324 kB", "VmStk" => "132 kB", "VmExe" => "5628 kB", "VmLib" => "8 kB", "VmPTE" => "120 kB", "VmSwap" => "504 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "13", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "8", "nonvoluntary_ctxt_switches" => "0"} D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 423 Ngid: 0 Pid: 423 PPid: 372 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 423 1 NSpid: 423 1 NSpgid: 423 1 NSsid: 423 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 34 nonvoluntary_ctxt_switches: 8 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "423", "Ngid" => "0", "Pid" => "423", "PPid" => "372", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "423\t1", "NSpid" => "423\t1", "NSpgid" => "423\t1", "NSsid" => "423\t1", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "28 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "34", "nonvoluntary_ctxt_switches" => "8"} D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 430 Ngid: 0 Pid: 430 PPid: 384 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 430 1 NSpid: 430 1 NSpgid: 430 1 NSsid: 430 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 24 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 35 nonvoluntary_ctxt_switches: 11 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "430", "Ngid" => "0", "Pid" => "430", "PPid" => "384", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "430\t1", "NSpid" => "430\t1", "NSpgid" => "430\t1", "NSsid" => "430\t1", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "24 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "2", "Seccomp_filters" => "1", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "35", "nonvoluntary_ctxt_switches" => "11"} D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: kube-proxy Umask: 0022 State: S (sleeping) Tgid: 479 Ngid: 331610 Pid: 479 PPid: 372 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 479 1 NSpid: 479 1 NSpgid: 479 1 NSsid: 479 1 VmPeak: 1299688 kB VmSize: 1299688 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 56656 kB VmRSS: 34240 kB RssAnon: 18436 kB RssFile: 15804 kB RssShmem: 0 kB VmData: 78976 kB VmStk: 132 kB VmExe: 30348 kB VmLib: 8 kB VmPTE: 288 kB VmSwap: 472 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 38 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 96966 nonvoluntary_ctxt_switches: 133 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "kube-proxy", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "479", "Ngid" => "331610", "Pid" => "479", "PPid" => "372", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "479\t1", "NSpid" => "479\t1", "NSpgid" => "479\t1", "NSsid" => "479\t1", "VmPeak" => "1299688 kB", "VmSize" => "1299688 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "56656 kB", "VmRSS" => "34240 kB", "RssAnon" => "18436 kB", "RssFile" => "15804 kB", "RssShmem" => "0 kB", "VmData" => "78976 kB", "VmStk" => "132 kB", "VmExe" => "30348 kB", "VmLib" => "8 kB", "VmPTE" => "288 kB", "VmSwap" => "472 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "38", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "96966", "nonvoluntary_ctxt_switches" => "133"} D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: kindnetd Umask: 0022 State: S (sleeping) Tgid: 680 Ngid: 117220 Pid: 680 PPid: 384 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 680 1 NSpid: 680 1 NSpgid: 680 1 NSsid: 680 1 VmPeak: 1276212 kB VmSize: 1276212 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 40068 kB VmRSS: 24024 kB RssAnon: 13400 kB RssFile: 10624 kB RssShmem: 0 kB VmData: 67572 kB VmStk: 132 kB VmExe: 21148 kB VmLib: 8 kB VmPTE: 248 kB VmSwap: 232 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 41 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba3a00 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 00000000a80435fb CapEff: 00000000a80435fb CapBnd: 00000000a80435fb CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 1091 nonvoluntary_ctxt_switches: 18 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "kindnetd", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "680", "Ngid" => "117220", "Pid" => "680", "PPid" => "384", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "680\t1", "NSpid" => "680\t1", "NSpgid" => "680\t1", "NSsid" => "680\t1", "VmPeak" => "1276212 kB", "VmSize" => "1276212 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "40068 kB", "VmRSS" => "24024 kB", "RssAnon" => "13400 kB", "RssFile" => "10624 kB", "RssShmem" => "0 kB", "VmData" => "67572 kB", "VmStk" => "132 kB", "VmExe" => "21148 kB", "VmLib" => "8 kB", "VmPTE" => "248 kB", "VmSwap" => "232 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "41", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba3a00", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "00000000a80435fb", "CapEff" => "00000000a80435fb", "CapBnd" => "00000000a80435fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "1091", "nonvoluntary_ctxt_switches" => "18"} D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 793 Ngid: 0 Pid: 793 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 793 NSpid: 793 NSpgid: 793 NSsid: 178 VmPeak: 1238312 kB VmSize: 1238312 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 15024 kB VmRSS: 14476 kB RssAnon: 3556 kB RssFile: 10920 kB RssShmem: 0 kB VmData: 45324 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 124 kB VmSwap: 88 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 13 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 9 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "793", "Ngid" => "0", "Pid" => "793", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "", "NStgid" => "793", "NSpid" => "793", "NSpgid" => "793", "NSsid" => "178", "VmPeak" => "1238312 kB", "VmSize" => "1238312 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "15024 kB", "VmRSS" => "14476 kB", "RssAnon" => "3556 kB", "RssFile" => "10920 kB", "RssShmem" => "0 kB", "VmData" => "45324 kB", "VmStk" => "132 kB", "VmExe" => "5628 kB", "VmLib" => "8 kB", "VmPTE" => "124 kB", "VmSwap" => "88 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "13", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "9", "nonvoluntary_ctxt_switches" => "0"} D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 818 Ngid: 0 Pid: 818 PPid: 793 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 818 1 NSpid: 818 1 NSpgid: 818 1 NSsid: 818 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 24 nonvoluntary_ctxt_switches: 7 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "818", "Ngid" => "0", "Pid" => "818", "PPid" => "793", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "818\t1", "NSpid" => "818\t1", "NSpgid" => "818\t1", "NSsid" => "818\t1", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "28 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "24", "nonvoluntary_ctxt_switches" => "7"} D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: sh Umask: 0022 State: S (sleeping) Tgid: 854 Ngid: 0 Pid: 854 PPid: 793 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 1 2 3 4 6 10 11 20 26 27 NStgid: 854 1 NSpid: 854 1 NSpgid: 854 1 NSsid: 854 1 VmPeak: 3552 kB VmSize: 1564 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 972 kB VmRSS: 84 kB RssAnon: 80 kB RssFile: 4 kB RssShmem: 0 kB VmData: 52 kB VmStk: 132 kB VmExe: 788 kB VmLib: 556 kB VmPTE: 44 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000004 SigCgt: 0000000000010002 CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 906 nonvoluntary_ctxt_switches: 9 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "sh", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "854", "Ngid" => "0", "Pid" => "854", "PPid" => "793", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0 1 2 3 4 6 10 11 20 26 27", "NStgid" => "854\t1", "NSpid" => "854\t1", "NSpgid" => "854\t1", "NSsid" => "854\t1", "VmPeak" => "3552 kB", "VmSize" => "1564 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "972 kB", "VmRSS" => "84 kB", "RssAnon" => "80 kB", "RssFile" => "4 kB", "RssShmem" => "0 kB", "VmData" => "52 kB", "VmStk" => "132 kB", "VmExe" => "788 kB", "VmLib" => "556 kB", "VmPTE" => "44 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000004", "SigCgt" => "0000000000010002", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "906", "nonvoluntary_ctxt_switches" => "9"} D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: proctree: [{"Name" => "coredns", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3113417", "Ngid" => "0", "Pid" => "3113417", "PPid" => "3113360", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "3113417\t1", "NSpid" => "3113417\t1", "NSpgid" => "3113417\t1", "NSsid" => "3113417\t1", "VmPeak" => "748492 kB", "VmSize" => "748492 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "41412 kB", "VmRSS" => "41412 kB", "RssAnon" => "12648 kB", "RssFile" => "28764 kB", "RssShmem" => "0 kB", "VmData" => "108680 kB", "VmStk" => "132 kB", "VmExe" => "22032 kB", "VmLib" => "8 kB", "VmPTE" => "200 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "22", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffe7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "00000000a80425fb", "CapEff" => "00000000a80425fb", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "460", "nonvoluntary_ctxt_switches" => "15", "cmdline" => "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000"}] D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: I, [2025-03-06 11:57:18 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:18 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- runc --root /run/containerd/runc/k8s.io/ state 8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782 I, [2025-03-06 11:57:18 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- runc --root /run/containerd/runc/k8s.io/ state 8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782 D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: { "ociVersion": "1.2.0", "id": "8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "pid": 3113417, "status": "running", "bundle": "/run/containerd/io.containerd.runtime.v2.task/k8s.io/8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "rootfs": "/run/containerd/io.containerd.runtime.v2.task/k8s.io/8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782/rootfs", "created": "2025-03-06T11:53:47.882949528Z", "annotations": { "io.kubernetes.cri.container-name": "coredns", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "docker.io/coredns/coredns:1.7.1", "io.kubernetes.cri.sandbox-id": "87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299", "io.kubernetes.cri.sandbox-name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.cri.sandbox-namespace": "cnf-default", "io.kubernetes.cri.sandbox-uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "owner": "" } D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "{\n \"ociVersion\": \"1.2.0\",\n \"id\": \"8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782\",\n \"pid\": 3113417,\n \"status\": \"running\",\n \"bundle\": \"/run/containerd/io.containerd.runtime.v2.task/k8s.io/8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782\",\n \"rootfs\": \"/run/containerd/io.containerd.runtime.v2.task/k8s.io/8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782/rootfs\",\n \"created\": \"2025-03-06T11:53:47.882949528Z\",\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"coredns\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"docker.io/coredns/coredns:1.7.1\",\n \"io.kubernetes.cri.sandbox-id\": \"87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299\",\n \"io.kubernetes.cri.sandbox-name\": \"coredns-coredns-64fc886fd4-clwtn\",\n \"io.kubernetes.cri.sandbox-namespace\": \"cnf-default\",\n \"io.kubernetes.cri.sandbox-uid\": \"1493bcca-c392-4f42-8125-d050b7590390\"\n },\n \"owner\": \"\"\n}", error: ""} I, [2025-03-06 11:57:18 UTC #1422] INFO -- cnf-testsuite-zombie_handled: resp[:output] { "ociVersion": "1.2.0", "id": "8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "pid": 3113417, "status": "running", "bundle": "/run/containerd/io.containerd.runtime.v2.task/k8s.io/8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "rootfs": "/run/containerd/io.containerd.runtime.v2.task/k8s.io/8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782/rootfs", "created": "2025-03-06T11:53:47.882949528Z", "annotations": { "io.kubernetes.cri.container-name": "coredns", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "docker.io/coredns/coredns:1.7.1", "io.kubernetes.cri.sandbox-id": "87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299", "io.kubernetes.cri.sandbox-name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.cri.sandbox-namespace": "cnf-default", "io.kubernetes.cri.sandbox-uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "owner": "" } I, [2025-03-06 11:57:18 UTC #1422] INFO -- cnf-testsuite-zombie_handled: bundle path: /run/containerd/io.containerd.runtime.v2.task/k8s.io/8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782 I, [2025-03-06 11:57:18 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:18 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:18 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- nerdctl --namespace=k8s.io cp /zombie 8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782:/zombie I, [2025-03-06 11:57:19 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- nerdctl --namespace=k8s.io cp /zombie 8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782:/zombie D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "", error: ""} I, [2025-03-06 11:57:19 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:19 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:19 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- nerdctl --namespace=k8s.io cp /sleep 8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782:/sleep I, [2025-03-06 11:57:19 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- nerdctl --namespace=k8s.io cp /sleep 8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782:/sleep D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "", error: ""} I, [2025-03-06 11:57:20 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:20 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- runc --root /run/containerd/runc/k8s.io/ exec --pid-file /run/containerd/io.containerd.runtime.v2.task/k8s.io/8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782/init.pid 8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782 /zombie I, [2025-03-06 11:57:20 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- runc --root /run/containerd/runc/k8s.io/ exec --pid-file /run/containerd/io.containerd.runtime.v2.task/k8s.io/8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782/init.pid 8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782 /zombie D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: I, [2025-03-06 11:57:20 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec stderr: time="2025-03-06T11:57:20Z" level=error msg="exec failed: unable to start container process: error adding pid 3114932 to cgroups: failed to write 3114932: openat2 /sys/fs/cgroup/perf_event/kubelet.slice/kubelet-kubepods.slice/kubelet-kubepods-pod1493bcca_c392_4f42_8125_d050b7590390.slice/cri-containerd-8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782.scope/cgroup.procs: no such file or directory" command terminated with exit code 255 D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[255], output: "", error: "time=\"2025-03-06T11:57:20Z\" level=error msg=\"exec failed: unable to start container process: error adding pid 3114932 to cgroups: failed to write 3114932: openat2 /sys/fs/cgroup/perf_event/kubelet.slice/kubelet-kubepods.slice/kubelet-kubepods-pod1493bcca_c392_4f42_8125_d050b7590390.slice/cri-containerd-8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782.scope/cgroup.procs: no such file or directory\"\ncommand terminated with exit code 255\n"} I, [2025-03-06 11:57:20 UTC #1422] INFO -- cnf-testsuite: container_status_result.all?(true): false I, [2025-03-06 11:57:20 UTC #1422] INFO -- cnf-testsuite: pod_resp.all?(true): false D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: yield resp: false I, [2025-03-06 11:57:20 UTC #1422] INFO -- cnf-testsuite-KubectlClient::Get.resource_volumes: Service resource_name: coredns-coredns namespace: cnf-default D, [2025-03-06 11:57:20 UTC #1422] DEBUG -- cnf-testsuite: workload resource test intialized: true test_passed: false I, [2025-03-06 11:57:30 UTC #1422] INFO -- cnf-testsuite: cnf_resource_ymls I, [2025-03-06 11:57:30 UTC #1422] INFO -- cnf-testsuite: manifest_path_to_ymls file_path: installed_cnf_files/common_manifest.yml I, [2025-03-06 11:57:30 UTC #1422] INFO -- cnf-testsuite: manifest_string_to_ymls D, [2025-03-06 11:57:30 UTC #1422] DEBUG -- cnf-testsuite: manifest_string_to_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:57:30 UTC #1422] DEBUG -- cnf-testsuite: cnf_resource_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:57:30 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Deployment D, [2025-03-06 11:57:30 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:57:30 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"} D, [2025-03-06 11:57:30 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: D, [2025-03-06 11:57:30 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:57:30 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Service D, [2025-03-06 11:57:30 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:57:30 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"} D, [2025-03-06 11:57:30 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: {} D, [2025-03-06 11:57:30 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] I, [2025-03-06 11:57:30 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Pod D, [2025-03-06 11:57:30 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:57:30 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:57:30 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ReplicaSet D, [2025-03-06 11:57:30 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:57:30 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:57:30 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: StatefulSet D, [2025-03-06 11:57:30 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:57:30 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:57:30 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: DaemonSet D, [2025-03-06 11:57:30 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:57:30 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:57:30 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ServiceAccount D, [2025-03-06 11:57:30 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:57:30 UTC #1422] DEBUG -- cnf-testsuite: resources: [] D, [2025-03-06 11:57:30 UTC #1422] DEBUG -- cnf-testsuite: all resource: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] D, [2025-03-06 11:57:30 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}} D, [2025-03-06 11:57:30 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}} D, [2025-03-06 11:57:30 UTC #1422] DEBUG -- cnf-testsuite: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] I, [2025-03-06 11:57:30 UTC #1422] INFO -- cnf-testsuite: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] I, [2025-03-06 11:57:30 UTC #1422] INFO -- cnf-testsuite-KubectlClient::Get.resource_volumes: Deployment resource_name: coredns-coredns namespace: cnf-default I, [2025-03-06 11:57:30 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default D, [2025-03-06 11:57:30 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "litmuschaos.io/chaos": "true", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 4, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4961737", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "availableReplicas": 1, "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 4, "readyReplicas": 1, "replicas": 1, "updatedReplicas": 1 } } I, [2025-03-06 11:57:30 UTC #1422] INFO -- cnf-testsuite: kubectl get resource volumes: [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}] D, [2025-03-06 11:57:30 UTC #1422] DEBUG -- cnf-testsuite: kubectl get resource containers kind: Deployment resource_name: coredns-coredns namespace: cnf-default I, [2025-03-06 11:57:30 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default D, [2025-03-06 11:57:30 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "litmuschaos.io/chaos": "true", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 4, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4961737", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "availableReplicas": 1, "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 4, "readyReplicas": 1, "replicas": 1, "updatedReplicas": 1 } } D, [2025-03-06 11:57:30 UTC #1422] DEBUG -- cnf-testsuite: kubectl get resource containers: [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}]}] I, [2025-03-06 11:57:30 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default D, [2025-03-06 11:57:30 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "litmuschaos.io/chaos": "true", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 4, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4961737", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "availableReplicas": 1, "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 4, "readyReplicas": 1, "replicas": 1, "updatedReplicas": 1 } } I, [2025-03-06 11:57:30 UTC #1422] INFO -- cnf-testsuite: pods_by_resource D, [2025-03-06 11:57:30 UTC #1422] DEBUG -- cnf-testsuite: pods_by_resource resource: {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"annotations" => {"deployment.kubernetes.io/revision" => "1", "litmuschaos.io/chaos" => "true", "meta.helm.sh/release-name" => "coredns", "meta.helm.sh/release-namespace" => "cnf-default"}, "creationTimestamp" => "2025-03-06T11:52:37Z", "generation" => 4, "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/name" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS"}, "name" => "coredns-coredns", "namespace" => "cnf-default", "resourceVersion" => "4961737", "uid" => "489e7e00-25be-4697-9d6f-9e9bc6689c66"}, "spec" => {"progressDeadlineSeconds" => 600, "replicas" => 1, "revisionHistoryLimit" => 10, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"}}, "strategy" => {"rollingUpdate" => {"maxSurge" => "25%", "maxUnavailable" => 1}, "type" => "RollingUpdate"}, "template" => {"metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => nil, "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"}}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}]}], "dnsPolicy" => "Default", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}]}}}, "status" => {"availableReplicas" => 1, "conditions" => [{"lastTransitionTime" => "2025-03-06T11:52:37Z", "lastUpdateTime" => "2025-03-06T11:52:52Z", "message" => "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason" => "NewReplicaSetAvailable", "status" => "True", "type" => "Progressing"}, {"lastTransitionTime" => "2025-03-06T11:53:07Z", "lastUpdateTime" => "2025-03-06T11:53:07Z", "message" => "Deployment has minimum availability.", "reason" => "MinimumReplicasAvailable", "status" => "True", "type" => "Available"}], "observedGeneration" => 4, "readyReplicas" => 1, "replicas" => 1, "updatedReplicas" => 1}} I, [2025-03-06 11:57:30 UTC #1422] INFO -- cnf-testsuite: resource kind: Deployment I, [2025-03-06 11:57:30 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:31 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:31 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:31 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:31 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:31 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:31 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:31 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:31 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:31 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:31 UTC #1422] DEBUG -- cnf-testsuite: taints: [{"effect" => "NoSchedule", "key" => "node-role.kubernetes.io/control-plane"}] I, [2025-03-06 11:57:31 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:31 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:31 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:31 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:31 UTC #1422] DEBUG -- cnf-testsuite: taints: I, [2025-03-06 11:57:31 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:31 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:31 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:32 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:32 UTC #1422] DEBUG -- cnf-testsuite: taints: D, [2025-03-06 11:57:32 UTC #1422] DEBUG -- cnf-testsuite: resource_map items : [{"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker"}, "name" => "v132-worker", "resourceVersion" => "4962054", "uid" => "f5b473ab-dbca-4331-a088-561021e2400f"}, "spec" => {"podCIDR" => "10.244.2.0/24", "podCIDRs" => ["10.244.2.0/24"], "providerID" => "kind://docker/v132/v132-worker"}, "status" => {"addresses" => [{"address" => "172.24.0.9", "type" => "InternalIP"}, {"address" => "v132-worker", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter"], "sizeBytes" => 351519591}, {"names" => ["docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter"], "sizeBytes" => 344304298}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter"], "sizeBytes" => 298627136}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter"], "sizeBytes" => 285504787}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0"], "sizeBytes" => 58057865}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6"], "sizeBytes" => 11555354}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "71e7b586a0c24b35898016e092b898c4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "09103c12-a066-4570-92b0-221c8c39ecb8"}}}, {"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4961618", "uid" => "a499c571-be9e-41e0-a4ea-dc082e96fd5a"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest"], "sizeBytes" => 72080558}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "960341c8-b3a9-4b4a-bb0c-142338daaac6"}}}] D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: nodes: [{"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker"}, "name" => "v132-worker", "resourceVersion" => "4962054", "uid" => "f5b473ab-dbca-4331-a088-561021e2400f"}, "spec" => {"podCIDR" => "10.244.2.0/24", "podCIDRs" => ["10.244.2.0/24"], "providerID" => "kind://docker/v132/v132-worker"}, "status" => {"addresses" => [{"address" => "172.24.0.9", "type" => "InternalIP"}, {"address" => "v132-worker", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter"], "sizeBytes" => 351519591}, {"names" => ["docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter"], "sizeBytes" => 344304298}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter"], "sizeBytes" => 298627136}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter"], "sizeBytes" => 285504787}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0"], "sizeBytes" => 58057865}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6"], "sizeBytes" => 11555354}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "71e7b586a0c24b35898016e092b898c4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "09103c12-a066-4570-92b0-221c8c39ecb8"}}}, {"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4961618", "uid" => "a499c571-be9e-41e0-a4ea-dc082e96fd5a"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest"], "sizeBytes" => 72080558}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "960341c8-b3a9-4b4a-bb0c-142338daaac6"}}}] D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker"} D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker I, [2025-03-06 11:57:33 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-mh426", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961311", "uid" => "95aa40ad-9e0e-486b-a5d0-41f9194fd651"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-9vvm7", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-9vvm7", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:35Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:35Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:35Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-9vvm7", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.9", "hostIPs" => [{"ip" => "172.24.0.9"}], "phase" => "Running", "podIP" => "172.24.0.9", "podIPs" => [{"ip" => "172.24.0.9"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-mh426 D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-5d7tp", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "604", "uid" => "740809cc-4bf8-40e5-a556-d39f5cf1ff03"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-wpwg9", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-wpwg9", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:41Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:41Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:41Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:40Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-wpwg9", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.9", "hostIPs" => [{"ip" => "172.24.0.9"}], "phase" => "Running", "podIP" => "10.244.2.2", "podIPs" => [{"ip" => "10.244.2.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-5d7tp D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-4s8ph", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "509", "uid" => "0f87ae31-f6df-43d6-b42a-0236e849318a"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-5p2rs", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-5p2rs", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:20Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:26Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-5p2rs", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.9", "hostIPs" => [{"ip" => "172.24.0.9"}], "phase" => "Running", "podIP" => "172.24.0.9", "podIPs" => [{"ip" => "172.24.0.9"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:20Z"}} D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-4s8ph D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-dkr2j", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "500", "uid" => "14b0603b-2896-496e-84e3-572ff7452828"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-sq7d2", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-sq7d2", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:25Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:20Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:25Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:25Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:24Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-sq7d2", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.9", "hostIPs" => [{"ip" => "172.24.0.9"}], "phase" => "Running", "podIP" => "172.24.0.9", "podIPs" => [{"ip" => "172.24.0.9"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:20Z"}} D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-dkr2j D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:33 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 I, [2025-03-06 11:57:33 UTC #1422] INFO -- cnf-testsuite: resource kind: Deployment I, [2025-03-06 11:57:33 UTC #1422] INFO -- cnf-testsuite: pods_by_resource name: coredns-coredns D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: resource_labels kind: Deployment resource_name: coredns-coredns I, [2025-03-06 11:57:33 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "litmuschaos.io/chaos": "true", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 4, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4961737", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "availableReplicas": 1, "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 4, "readyReplicas": 1, "replicas": 1, "updatedReplicas": 1 } } D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: resource_labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} I, [2025-03-06 11:57:33 UTC #1422] INFO -- cnf-testsuite: pods_by_resource labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns I, [2025-03-06 11:57:33 UTC #1422] INFO -- cnf-testsuite: pod_name: coredns-coredns-64fc886fd4-clwtn I, [2025-03-06 11:57:33 UTC #1422] INFO -- cnf-testsuite: container_statuses: [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] I, [2025-03-06 11:57:33 UTC #1422] INFO -- cnf-testsuite: pod_name: coredns-coredns-64fc886fd4-clwtn I, [2025-03-06 11:57:33 UTC #1422] INFO -- cnf-testsuite: nodes_by_pod pod name: coredns-coredns-64fc886fd4-clwtn I, [2025-03-06 11:57:33 UTC #1422] INFO -- cnf-testsuite: resource_select I, [2025-03-06 11:57:33 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:33 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:33 UTC #1422] INFO -- cnf-testsuite: nodes size: 3 I, [2025-03-06 11:57:33 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:33 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:34 UTC #1422] INFO -- cnf-testsuite: nodes : {"apiVersion" => "v1", "items" => [{"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:05Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-control-plane", "kubernetes.io/os" => "linux", "node-role.kubernetes.io/control-plane" => "", "node.kubernetes.io/exclude-from-external-load-balancers" => ""}, "name" => "v132-control-plane", "resourceVersion" => "4961381", "uid" => "e3a8ca14-2d88-4785-a327-522fe918366a"}, "spec" => {"podCIDR" => "10.244.0.0/24", "podCIDRs" => ["10.244.0.0/24"], "providerID" => "kind://docker/v132/v132-control-plane", "taints" => [{"effect" => "NoSchedule", "key" => "node-role.kubernetes.io/control-plane"}]}, "status" => {"addresses" => [{"address" => "172.24.0.10", "type" => "InternalIP"}, {"address" => "v132-control-plane", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:52:51Z", "lastTransitionTime" => "2025-01-31T08:09:03Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:52:51Z", "lastTransitionTime" => "2025-01-31T08:09:03Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:52:51Z", "lastTransitionTime" => "2025-01-31T08:09:03Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:52:51Z", "lastTransitionTime" => "2025-01-31T08:09:29Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0"], "sizeBytes" => 58057865}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6"], "sizeBytes" => 2021226}, {"names" => ["registry.k8s.io/pause:3.10"], "sizeBytes" => 320368}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "c94df63d-d52d-4f3e-a918-e56af4ca2553"}}}, {"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker"}, "name" => "v132-worker", "resourceVersion" => "4962054", "uid" => "f5b473ab-dbca-4331-a088-561021e2400f"}, "spec" => {"podCIDR" => "10.244.2.0/24", "podCIDRs" => ["10.244.2.0/24"], "providerID" => "kind://docker/v132/v132-worker"}, "status" => {"addresses" => [{"address" => "172.24.0.9", "type" => "InternalIP"}, {"address" => "v132-worker", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter"], "sizeBytes" => 351519591}, {"names" => ["docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter"], "sizeBytes" => 344304298}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter"], "sizeBytes" => 298627136}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter"], "sizeBytes" => 285504787}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0"], "sizeBytes" => 58057865}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6"], "sizeBytes" => 11555354}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "71e7b586a0c24b35898016e092b898c4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "09103c12-a066-4570-92b0-221c8c39ecb8"}}}, {"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4961618", "uid" => "a499c571-be9e-41e0-a4ea-dc082e96fd5a"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest"], "sizeBytes" => 72080558}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "960341c8-b3a9-4b4a-bb0c-142338daaac6"}}}], "kind" => "List", "metadata" => {"resourceVersion" => ""}} I, [2025-03-06 11:57:34 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:34 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:34 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:34 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:34 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:34 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:34 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:34 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:34 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:34 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:34 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:34 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:34 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:34 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:34 UTC #1422] DEBUG -- cnf-testsuite: resource_map items : [{"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4961618", "uid" => "a499c571-be9e-41e0-a4ea-dc082e96fd5a"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest"], "sizeBytes" => 72080558}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "960341c8-b3a9-4b4a-bb0c-142338daaac6"}}}] D, [2025-03-06 11:57:34 UTC #1422] DEBUG -- cnf-testsuite: nodes: [{"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4961618", "uid" => "a499c571-be9e-41e0-a4ea-dc082e96fd5a"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest"], "sizeBytes" => 72080558}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "960341c8-b3a9-4b4a-bb0c-142338daaac6"}}}] I, [2025-03-06 11:57:34 UTC #1422] INFO -- cnf-testsuite: nodes_by_resource done I, [2025-03-06 11:57:34 UTC #1422] INFO -- cnf-testsuite: before ready containerStatuses container_id 8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782 I, [2025-03-06 11:57:34 UTC #1422] INFO -- cnf-testsuite: containerStatuses container_id 8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782 I, [2025-03-06 11:57:34 UTC #1422] INFO -- cnf-testsuite: node_pid_by_container_id container_id: 8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782 I, [2025-03-06 11:57:34 UTC #1422] INFO -- cnf-testsuite: parse_container_id container_id: 8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782 I, [2025-03-06 11:57:34 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:34 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:34 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:34 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:34 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- crictl inspect 8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782 I, [2025-03-06 11:57:35 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- crictl inspect 8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: { "status": { "id": "8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "metadata": { "attempt": 0, "name": "coredns" }, "state": "CONTAINER_RUNNING", "createdAt": "2025-03-06T11:53:46.309860166Z", "startedAt": "2025-03-06T11:53:47.994396555Z", "finishedAt": "1970-01-01T00:00:00Z", "exitCode": 0, "image": { "image": "docker.io/coredns/coredns:1.7.1" }, "imageRef": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "reason": "", "message": "", "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "annotations": { "io.kubernetes.container.hash": "30544dd1", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "mounts": [ { "containerPath": "/etc/coredns", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "selinuxRelabel": false }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "selinuxRelabel": false }, { "containerPath": "/etc/hosts", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "selinuxRelabel": false }, { "containerPath": "/dev/termination-log", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "selinuxRelabel": false } ], "logPath": "/var/log/pods/cnf-default_coredns-coredns-64fc886fd4-clwtn_1493bcca-c392-4f42-8125-d050b7590390/coredns/0.log" }, "info": { "sandboxID": "87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299", "pid": 3113417, "removing": false, "snapshotKey": "8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "snapshotter": "overlayfs", "runtimeType": "io.containerd.runc.v2", "runtimeOptions": { "systemd_cgroup": true }, "config": { "metadata": { "name": "coredns" }, "image": { "image": "sha256:0a6cfbf7b0b6606f404f703a3ce24f3f637437b2d06d38008c033c42a2860f5f" }, "args": [ "-conf", "/etc/coredns/Corefile" ], "envs": [ { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "COREDNS_COREDNS_SERVICE_PORT", "value": "53" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_TCP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT", "value": "udp://10.96.24.213:53" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_ADDR", "value": "10.96.24.213" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "COREDNS_COREDNS_SERVICE_HOST", "value": "10.96.24.213" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PROTO", "value": "udp" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PORT", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_TCP", "value": "tcp://10.96.24.213:53" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PORT", "value": "53" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_UDP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP", "value": "udp://10.96.24.213:53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_ADDR", "value": "10.96.24.213" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" } ], "mounts": [ { "container_path": "/etc/coredns", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume", "readonly": true }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8" } ], "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "annotations": { "io.kubernetes.container.hash": "30544dd1", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "log_path": "coredns/0.log", "linux": { "resources": { "cpu_period": 100000, "cpu_quota": 10000, "cpu_shares": 102, "memory_limit_in_bytes": 134217728, "oom_score_adj": -997, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "memory_swap_limit_in_bytes": 134217728 }, "security_context": { "namespace_options": { "pid": 1 }, "run_as_user": {}, "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "seccomp": { "profile_type": 1 } } } }, "runtimeSpec": { "ociVersion": "1.1.0", "process": { "user": { "uid": 0, "gid": 0, "additionalGids": [ 0 ] }, "args": [ "/coredns", "-conf", "/etc/coredns/Corefile" ], "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=coredns-coredns-64fc886fd4-clwtn", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "COREDNS_COREDNS_SERVICE_PORT=53", "COREDNS_COREDNS_SERVICE_PORT_TCP_53=53", "COREDNS_COREDNS_PORT=udp://10.96.24.213:53", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "COREDNS_COREDNS_PORT_53_TCP_ADDR=10.96.24.213", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_PORT=tcp://10.96.0.1:443", "COREDNS_COREDNS_SERVICE_HOST=10.96.24.213", "COREDNS_COREDNS_PORT_53_UDP_PROTO=udp", "COREDNS_COREDNS_PORT_53_UDP_PORT=53", "COREDNS_COREDNS_PORT_53_TCP=tcp://10.96.24.213:53", "COREDNS_COREDNS_PORT_53_TCP_PORT=53", "KUBERNETES_PORT_443_TCP_PORT=443", "COREDNS_COREDNS_SERVICE_PORT_UDP_53=53", "COREDNS_COREDNS_PORT_53_UDP=udp://10.96.24.213:53", "COREDNS_COREDNS_PORT_53_UDP_ADDR=10.96.24.213", "COREDNS_COREDNS_PORT_53_TCP_PROTO=tcp", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_SERVICE_HOST=10.96.0.1" ], "cwd": "/", "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ] }, "oomScoreAdj": -997 }, "root": { "path": "rootfs" }, "mounts": [ { "destination": "/proc", "type": "proc", "source": "proc", "options": [ "nosuid", "noexec", "nodev" ] }, { "destination": "/dev", "type": "tmpfs", "source": "tmpfs", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ] }, { "destination": "/dev/pts", "type": "devpts", "source": "devpts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ] }, { "destination": "/dev/mqueue", "type": "mqueue", "source": "mqueue", "options": [ "nosuid", "noexec", "nodev" ] }, { "destination": "/sys", "type": "sysfs", "source": "sysfs", "options": [ "nosuid", "noexec", "nodev", "ro" ] }, { "destination": "/sys/fs/cgroup", "type": "cgroup", "source": "cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ] }, { "destination": "/etc/coredns", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume", "options": [ "rbind", "rprivate", "ro" ] }, { "destination": "/etc/hosts", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/dev/termination-log", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/etc/hostname", "type": "bind", "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/hostname", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/etc/resolv.conf", "type": "bind", "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/resolv.conf", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/dev/shm", "type": "bind", "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/shm", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz", "options": [ "rbind", "rprivate", "ro" ] } ], "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "annotations": { "io.kubernetes.cri.container-name": "coredns", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "docker.io/coredns/coredns:1.7.1", "io.kubernetes.cri.sandbox-id": "87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299", "io.kubernetes.cri.sandbox-name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.cri.sandbox-namespace": "cnf-default", "io.kubernetes.cri.sandbox-uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "linux": { "resources": { "devices": [ { "allow": false, "access": "rwm" } ], "memory": { "limit": 134217728, "swap": 134217728 }, "cpu": { "shares": 102, "quota": 10000, "period": 100000 } }, "cgroupsPath": "kubelet-kubepods-pod1493bcca_c392_4f42_8125_d050b7590390.slice:cri-containerd:8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "namespaces": [ { "type": "pid" }, { "type": "ipc", "path": "/proc/3113384/ns/ipc" }, { "type": "uts", "path": "/proc/3113384/ns/uts" }, { "type": "mount" }, { "type": "network", "path": "/proc/3113384/ns/net" } ], "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ] } } } } D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "{\n \"status\": {\n \"id\": \"8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"coredns\"\n },\n \"state\": \"CONTAINER_RUNNING\",\n \"createdAt\": \"2025-03-06T11:53:46.309860166Z\",\n \"startedAt\": \"2025-03-06T11:53:47.994396555Z\",\n \"finishedAt\": \"1970-01-01T00:00:00Z\",\n \"exitCode\": 0,\n \"image\": {\n \"image\": \"docker.io/coredns/coredns:1.7.1\"\n },\n \"imageRef\": \"docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef\",\n \"reason\": \"\",\n \"message\": \"\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"coredns\",\n \"io.kubernetes.pod.name\": \"coredns-coredns-64fc886fd4-clwtn\",\n \"io.kubernetes.pod.namespace\": \"cnf-default\",\n \"io.kubernetes.pod.uid\": \"1493bcca-c392-4f42-8125-d050b7590390\"\n },\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"30544dd1\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"udp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"UDP\\\"},{\\\"name\\\":\\\"tcp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/etc/coredns\",\n \"hostPath\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"selinuxRelabel\": false\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"hostPath\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"selinuxRelabel\": false\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"hostPath\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"selinuxRelabel\": false\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"hostPath\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"selinuxRelabel\": false\n }\n ],\n \"logPath\": \"/var/log/pods/cnf-default_coredns-coredns-64fc886fd4-clwtn_1493bcca-c392-4f42-8125-d050b7590390/coredns/0.log\"\n },\n \"info\": {\n \"sandboxID\": \"87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299\",\n \"pid\": 3113417,\n \"removing\": false,\n \"snapshotKey\": \"8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782\",\n \"snapshotter\": \"overlayfs\",\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"config\": {\n \"metadata\": {\n \"name\": \"coredns\"\n },\n \"image\": {\n \"image\": \"sha256:0a6cfbf7b0b6606f404f703a3ce24f3f637437b2d06d38008c033c42a2860f5f\"\n },\n \"args\": [\n \"-conf\",\n \"/etc/coredns/Corefile\"\n ],\n \"envs\": [\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT_TCP_53\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT\",\n \"value\": \"udp://10.96.24.213:53\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_ADDR\",\n \"value\": \"10.96.24.213\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_HOST\",\n \"value\": \"10.96.24.213\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_PROTO\",\n \"value\": \"udp\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP\",\n \"value\": \"tcp://10.96.24.213:53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT_UDP_53\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP\",\n \"value\": \"udp://10.96.24.213:53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_ADDR\",\n \"value\": \"10.96.24.213\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n }\n ],\n \"mounts\": [\n {\n \"container_path\": \"/etc/coredns\",\n \"host_path\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8\"\n }\n ],\n \"labels\": {\n \"io.kubernetes.container.name\": \"coredns\",\n \"io.kubernetes.pod.name\": \"coredns-coredns-64fc886fd4-clwtn\",\n \"io.kubernetes.pod.namespace\": \"cnf-default\",\n \"io.kubernetes.pod.uid\": \"1493bcca-c392-4f42-8125-d050b7590390\"\n },\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"30544dd1\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"udp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"UDP\\\"},{\\\"name\\\":\\\"tcp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"log_path\": \"coredns/0.log\",\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_quota\": 10000,\n \"cpu_shares\": 102,\n \"memory_limit_in_bytes\": 134217728,\n \"oom_score_adj\": -997,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"memory_swap_limit_in_bytes\": 134217728\n },\n \"security_context\": {\n \"namespace_options\": {\n \"pid\": 1\n },\n \"run_as_user\": {},\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"seccomp\": {\n \"profile_type\": 1\n }\n }\n }\n },\n \"runtimeSpec\": {\n \"ociVersion\": \"1.1.0\",\n \"process\": {\n \"user\": {\n \"uid\": 0,\n \"gid\": 0,\n \"additionalGids\": [\n 0\n ]\n },\n \"args\": [\n \"/coredns\",\n \"-conf\",\n \"/etc/coredns/Corefile\"\n ],\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=coredns-coredns-64fc886fd4-clwtn\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"COREDNS_COREDNS_SERVICE_PORT=53\",\n \"COREDNS_COREDNS_SERVICE_PORT_TCP_53=53\",\n \"COREDNS_COREDNS_PORT=udp://10.96.24.213:53\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"COREDNS_COREDNS_PORT_53_TCP_ADDR=10.96.24.213\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"COREDNS_COREDNS_SERVICE_HOST=10.96.24.213\",\n \"COREDNS_COREDNS_PORT_53_UDP_PROTO=udp\",\n \"COREDNS_COREDNS_PORT_53_UDP_PORT=53\",\n \"COREDNS_COREDNS_PORT_53_TCP=tcp://10.96.24.213:53\",\n \"COREDNS_COREDNS_PORT_53_TCP_PORT=53\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"COREDNS_COREDNS_SERVICE_PORT_UDP_53=53\",\n \"COREDNS_COREDNS_PORT_53_UDP=udp://10.96.24.213:53\",\n \"COREDNS_COREDNS_PORT_53_UDP_ADDR=10.96.24.213\",\n \"COREDNS_COREDNS_PORT_53_TCP_PROTO=tcp\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\"\n ],\n \"cwd\": \"/\",\n \"capabilities\": {\n \"bounding\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ],\n \"effective\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ],\n \"permitted\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ]\n },\n \"oomScoreAdj\": -997\n },\n \"root\": {\n \"path\": \"rootfs\"\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"type\": \"proc\",\n \"source\": \"proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ]\n },\n {\n \"destination\": \"/dev\",\n \"type\": \"tmpfs\",\n \"source\": \"tmpfs\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ]\n },\n {\n \"destination\": \"/dev/pts\",\n \"type\": \"devpts\",\n \"source\": \"devpts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ]\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"type\": \"mqueue\",\n \"source\": \"mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ]\n },\n {\n \"destination\": \"/sys\",\n \"type\": \"sysfs\",\n \"source\": \"sysfs\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"ro\"\n ]\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"type\": \"cgroup\",\n \"source\": \"cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"ro\"\n ]\n },\n {\n \"destination\": \"/etc/coredns\",\n \"type\": \"bind\",\n \"source\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ]\n },\n {\n \"destination\": \"/etc/hosts\",\n \"type\": \"bind\",\n \"source\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ]\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"type\": \"bind\",\n \"source\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ]\n },\n {\n \"destination\": \"/etc/hostname\",\n \"type\": \"bind\",\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ]\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"type\": \"bind\",\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ]\n },\n {\n \"destination\": \"/dev/shm\",\n \"type\": \"bind\",\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ]\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"type\": \"bind\",\n \"source\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ]\n }\n ],\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"coredns\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"docker.io/coredns/coredns:1.7.1\",\n \"io.kubernetes.cri.sandbox-id\": \"87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299\",\n \"io.kubernetes.cri.sandbox-name\": \"coredns-coredns-64fc886fd4-clwtn\",\n \"io.kubernetes.cri.sandbox-namespace\": \"cnf-default\",\n \"io.kubernetes.cri.sandbox-uid\": \"1493bcca-c392-4f42-8125-d050b7590390\"\n },\n \"linux\": {\n \"resources\": {\n \"devices\": [\n {\n \"allow\": false,\n \"access\": \"rwm\"\n }\n ],\n \"memory\": {\n \"limit\": 134217728,\n \"swap\": 134217728\n },\n \"cpu\": {\n \"shares\": 102,\n \"quota\": 10000,\n \"period\": 100000\n }\n },\n \"cgroupsPath\": \"kubelet-kubepods-pod1493bcca_c392_4f42_8125_d050b7590390.slice:cri-containerd:8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782\",\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"type\": \"ipc\",\n \"path\": \"/proc/3113384/ns/ipc\"\n },\n {\n \"type\": \"uts\",\n \"path\": \"/proc/3113384/ns/uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"type\": \"network\",\n \"path\": \"/proc/3113384/ns/net\"\n }\n ],\n \"maskedPaths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"readonlyPaths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ]\n }\n }\n }\n}\n", error: ""} D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: node_pid_by_container_id inspect: { "status": { "id": "8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "metadata": { "attempt": 0, "name": "coredns" }, "state": "CONTAINER_RUNNING", "createdAt": "2025-03-06T11:53:46.309860166Z", "startedAt": "2025-03-06T11:53:47.994396555Z", "finishedAt": "1970-01-01T00:00:00Z", "exitCode": 0, "image": { "image": "docker.io/coredns/coredns:1.7.1" }, "imageRef": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "reason": "", "message": "", "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "annotations": { "io.kubernetes.container.hash": "30544dd1", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "mounts": [ { "containerPath": "/etc/coredns", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "selinuxRelabel": false }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "selinuxRelabel": false }, { "containerPath": "/etc/hosts", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "selinuxRelabel": false }, { "containerPath": "/dev/termination-log", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "selinuxRelabel": false } ], "logPath": "/var/log/pods/cnf-default_coredns-coredns-64fc886fd4-clwtn_1493bcca-c392-4f42-8125-d050b7590390/coredns/0.log" }, "info": { "sandboxID": "87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299", "pid": 3113417, "removing": false, "snapshotKey": "8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "snapshotter": "overlayfs", "runtimeType": "io.containerd.runc.v2", "runtimeOptions": { "systemd_cgroup": true }, "config": { "metadata": { "name": "coredns" }, "image": { "image": "sha256:0a6cfbf7b0b6606f404f703a3ce24f3f637437b2d06d38008c033c42a2860f5f" }, "args": [ "-conf", "/etc/coredns/Corefile" ], "envs": [ { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "COREDNS_COREDNS_SERVICE_PORT", "value": "53" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_TCP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT", "value": "udp://10.96.24.213:53" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_ADDR", "value": "10.96.24.213" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "COREDNS_COREDNS_SERVICE_HOST", "value": "10.96.24.213" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PROTO", "value": "udp" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PORT", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_TCP", "value": "tcp://10.96.24.213:53" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PORT", "value": "53" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_UDP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP", "value": "udp://10.96.24.213:53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_ADDR", "value": "10.96.24.213" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" } ], "mounts": [ { "container_path": "/etc/coredns", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume", "readonly": true }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8" } ], "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "annotations": { "io.kubernetes.container.hash": "30544dd1", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "log_path": "coredns/0.log", "linux": { "resources": { "cpu_period": 100000, "cpu_quota": 10000, "cpu_shares": 102, "memory_limit_in_bytes": 134217728, "oom_score_adj": -997, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "memory_swap_limit_in_bytes": 134217728 }, "security_context": { "namespace_options": { "pid": 1 }, "run_as_user": {}, "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "seccomp": { "profile_type": 1 } } } }, "runtimeSpec": { "ociVersion": "1.1.0", "process": { "user": { "uid": 0, "gid": 0, "additionalGids": [ 0 ] }, "args": [ "/coredns", "-conf", "/etc/coredns/Corefile" ], "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=coredns-coredns-64fc886fd4-clwtn", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "COREDNS_COREDNS_SERVICE_PORT=53", "COREDNS_COREDNS_SERVICE_PORT_TCP_53=53", "COREDNS_COREDNS_PORT=udp://10.96.24.213:53", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "COREDNS_COREDNS_PORT_53_TCP_ADDR=10.96.24.213", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_PORT=tcp://10.96.0.1:443", "COREDNS_COREDNS_SERVICE_HOST=10.96.24.213", "COREDNS_COREDNS_PORT_53_UDP_PROTO=udp", "COREDNS_COREDNS_PORT_53_UDP_PORT=53", "COREDNS_COREDNS_PORT_53_TCP=tcp://10.96.24.213:53", "COREDNS_COREDNS_PORT_53_TCP_PORT=53", "KUBERNETES_PORT_443_TCP_PORT=443", "COREDNS_COREDNS_SERVICE_PORT_UDP_53=53", "COREDNS_COREDNS_PORT_53_UDP=udp://10.96.24.213:53", "COREDNS_COREDNS_PORT_53_UDP_ADDR=10.96.24.213", "COREDNS_COREDNS_PORT_53_TCP_PROTO=tcp", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_SERVICE_HOST=10.96.0.1" ], "cwd": "/", "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ] }, "oomScoreAdj": -997 }, "root": { "path": "rootfs" }, "mounts": [ { "destination": "/proc", "type": "proc", "source": "proc", "options": [ "nosuid", "noexec", "nodev" ] }, { "destination": "/dev", "type": "tmpfs", "source": "tmpfs", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ] }, { "destination": "/dev/pts", "type": "devpts", "source": "devpts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ] }, { "destination": "/dev/mqueue", "type": "mqueue", "source": "mqueue", "options": [ "nosuid", "noexec", "nodev" ] }, { "destination": "/sys", "type": "sysfs", "source": "sysfs", "options": [ "nosuid", "noexec", "nodev", "ro" ] }, { "destination": "/sys/fs/cgroup", "type": "cgroup", "source": "cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ] }, { "destination": "/etc/coredns", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume", "options": [ "rbind", "rprivate", "ro" ] }, { "destination": "/etc/hosts", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/dev/termination-log", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/etc/hostname", "type": "bind", "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/hostname", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/etc/resolv.conf", "type": "bind", "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/resolv.conf", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/dev/shm", "type": "bind", "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/shm", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz", "options": [ "rbind", "rprivate", "ro" ] } ], "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "annotations": { "io.kubernetes.cri.container-name": "coredns", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "docker.io/coredns/coredns:1.7.1", "io.kubernetes.cri.sandbox-id": "87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299", "io.kubernetes.cri.sandbox-name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.cri.sandbox-namespace": "cnf-default", "io.kubernetes.cri.sandbox-uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "linux": { "resources": { "devices": [ { "allow": false, "access": "rwm" } ], "memory": { "limit": 134217728, "swap": 134217728 }, "cpu": { "shares": 102, "quota": 10000, "period": 100000 } }, "cgroupsPath": "kubelet-kubepods-pod1493bcca_c392_4f42_8125_d050b7590390.slice:cri-containerd:8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "namespaces": [ { "type": "pid" }, { "type": "ipc", "path": "/proc/3113384/ns/ipc" }, { "type": "uts", "path": "/proc/3113384/ns/uts" }, { "type": "mount" }, { "type": "network", "path": "/proc/3113384/ns/net" } ], "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ] } } } } I, [2025-03-06 11:57:35 UTC #1422] INFO -- cnf-testsuite: node_pid_by_container_id pid: 3113417 I, [2025-03-06 11:57:35 UTC #1422] INFO -- cnf-testsuite: node pid (should never be pid 1): 3113417 I, [2025-03-06 11:57:35 UTC #1422] INFO -- cnf-testsuite: node name : v132-worker2 I, [2025-03-06 11:57:35 UTC #1422] INFO -- cnf-testsuite: pids I, [2025-03-06 11:57:35 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:35 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- ls /proc/ I, [2025-03-06 11:57:35 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- ls /proc/ D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: 1 162 1749 178 284 3111878 3111903 3111937 3111957 3112901 3112926 3112959 3113360 3113384 3113417 3114976 372 384 423 430 479 680 793 818 854 acpi bootconfig buddyinfo bus cgroups cmdline consoles cpuinfo crypto devices diskstats dma driver dynamic_debug execdomains fb filesystems fs interrupts iomem ioports irq kallsyms kcore key-users keys kmsg kpagecgroup kpagecount kpageflags loadavg locks mdstat meminfo misc modules mounts mtrr net pagetypeinfo partitions pressure schedstat scsi self slabinfo softirqs stat swaps sys sysrq-trigger sysvipc thread-self timer_list tty uptime version version_signature vmallocinfo vmstat zoneinfo D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "1\n162\n1749\n178\n284\n3111878\n3111903\n3111937\n3111957\n3112901\n3112926\n3112959\n3113360\n3113384\n3113417\n3114976\n372\n384\n423\n430\n479\n680\n793\n818\n854\nacpi\nbootconfig\nbuddyinfo\nbus\ncgroups\ncmdline\nconsoles\ncpuinfo\ncrypto\ndevices\ndiskstats\ndma\ndriver\ndynamic_debug\nexecdomains\nfb\nfilesystems\nfs\ninterrupts\niomem\nioports\nirq\nkallsyms\nkcore\nkey-users\nkeys\nkmsg\nkpagecgroup\nkpagecount\nkpageflags\nloadavg\nlocks\nmdstat\nmeminfo\nmisc\nmodules\nmounts\nmtrr\nnet\npagetypeinfo\npartitions\npressure\nschedstat\nscsi\nself\nslabinfo\nsoftirqs\nstat\nswaps\nsys\nsysrq-trigger\nsysvipc\nthread-self\ntimer_list\ntty\nuptime\nversion\nversion_signature\nvmallocinfo\nvmstat\nzoneinfo\n", error: ""} I, [2025-03-06 11:57:35 UTC #1422] INFO -- cnf-testsuite: pids ls_proc: {status: Process::Status[0], output: "1\n162\n1749\n178\n284\n3111878\n3111903\n3111937\n3111957\n3112901\n3112926\n3112959\n3113360\n3113384\n3113417\n3114976\n372\n384\n423\n430\n479\n680\n793\n818\n854\nacpi\nbootconfig\nbuddyinfo\nbus\ncgroups\ncmdline\nconsoles\ncpuinfo\ncrypto\ndevices\ndiskstats\ndma\ndriver\ndynamic_debug\nexecdomains\nfb\nfilesystems\nfs\ninterrupts\niomem\nioports\nirq\nkallsyms\nkcore\nkey-users\nkeys\nkmsg\nkpagecgroup\nkpagecount\nkpageflags\nloadavg\nlocks\nmdstat\nmeminfo\nmisc\nmodules\nmounts\nmtrr\nnet\npagetypeinfo\npartitions\npressure\nschedstat\nscsi\nself\nslabinfo\nsoftirqs\nstat\nswaps\nsys\nsysrq-trigger\nsysvipc\nthread-self\ntimer_list\ntty\nuptime\nversion\nversion_signature\nvmallocinfo\nvmstat\nzoneinfo\n", error: ""} D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: parse_ls ls: 1 162 1749 178 284 3111878 3111903 3111937 3111957 3112901 3112926 3112959 3113360 3113384 3113417 3114976 372 384 423 430 479 680 793 818 854 acpi bootconfig buddyinfo bus cgroups cmdline consoles cpuinfo crypto devices diskstats dma driver dynamic_debug execdomains fb filesystems fs interrupts iomem ioports irq kallsyms kcore key-users keys kmsg kpagecgroup kpagecount kpageflags loadavg locks mdstat meminfo misc modules mounts mtrr net pagetypeinfo partitions pressure schedstat scsi self slabinfo softirqs stat swaps sys sysrq-trigger sysvipc thread-self timer_list tty uptime version version_signature vmallocinfo vmstat zoneinfo D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: parse_ls parsed: ["1", "162", "1749", "178", "284", "3111878", "3111903", "3111937", "3111957", "3112901", "3112926", "3112959", "3113360", "3113384", "3113417", "3114976", "372", "384", "423", "430", "479", "680", "793", "818", "854", "acpi", "bootconfig", "buddyinfo", "bus", "cgroups", "cmdline", "consoles", "cpuinfo", "crypto", "devices", "diskstats", "dma", "driver", "dynamic_debug", "execdomains", "fb", "filesystems", "fs", "interrupts", "iomem", "ioports", "irq", "kallsyms", "kcore", "key-users", "keys", "kmsg", "kpagecgroup", "kpagecount", "kpageflags", "loadavg", "locks", "mdstat", "meminfo", "misc", "modules", "mounts", "mtrr", "net", "pagetypeinfo", "partitions", "pressure", "schedstat", "scsi", "self", "slabinfo", "softirqs", "stat", "swaps", "sys", "sysrq-trigger", "sysvipc", "thread-self", "timer_list", "tty", "uptime", "version", "version_signature", "vmallocinfo", "vmstat", "zoneinfo"] D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: pids_from_ls_proc ls: ["1", "162", "1749", "178", "284", "3111878", "3111903", "3111937", "3111957", "3112901", "3112926", "3112959", "3113360", "3113384", "3113417", "3114976", "372", "384", "423", "430", "479", "680", "793", "818", "854", "acpi", "bootconfig", "buddyinfo", "bus", "cgroups", "cmdline", "consoles", "cpuinfo", "crypto", "devices", "diskstats", "dma", "driver", "dynamic_debug", "execdomains", "fb", "filesystems", "fs", "interrupts", "iomem", "ioports", "irq", "kallsyms", "kcore", "key-users", "keys", "kmsg", "kpagecgroup", "kpagecount", "kpageflags", "loadavg", "locks", "mdstat", "meminfo", "misc", "modules", "mounts", "mtrr", "net", "pagetypeinfo", "partitions", "pressure", "schedstat", "scsi", "self", "slabinfo", "softirqs", "stat", "swaps", "sys", "sysrq-trigger", "sysvipc", "thread-self", "timer_list", "tty", "uptime", "version", "version_signature", "vmallocinfo", "vmstat", "zoneinfo"] D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: pids_from_ls_proc pids: ["1", "162", "1749", "178", "284", "3111878", "3111903", "3111937", "3111957", "3112901", "3112926", "3112959", "3113360", "3113384", "3113417", "3114976", "372", "384", "423", "430", "479", "680", "793", "818", "854"] I, [2025-03-06 11:57:35 UTC #1422] INFO -- cnf-testsuite: parsed pids: ["1", "162", "1749", "178", "284", "3111878", "3111903", "3111937", "3111957", "3112901", "3112926", "3112959", "3113360", "3113384", "3113417", "3114976", "372", "384", "423", "430", "479", "680", "793", "818", "854"] I, [2025-03-06 11:57:35 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids I, [2025-03-06 11:57:35 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 1 I, [2025-03-06 11:57:35 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:35 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:35 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/1/status I, [2025-03-06 11:57:36 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/1/status D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: systemd Umask: 0000 State: S (sleeping) Tgid: 1 Ngid: 0 Pid: 1 PPid: 0 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 256 Groups: NStgid: 1 NSpid: 1 NSpgid: 1 NSsid: 1 VmPeak: 35920 kB VmSize: 35800 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 25920 kB VmRSS: 25332 kB RssAnon: 18052 kB RssFile: 7280 kB RssShmem: 0 kB VmData: 16892 kB VmStk: 1040 kB VmExe: 40 kB VmLib: 10680 kB VmPTE: 112 kB VmSwap: 672 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 7fe3c0fe28014a03 SigIgn: 0000000000001000 SigCgt: 00000000000004ec CapInh: 0000003fffffffff CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 854445 nonvoluntary_ctxt_switches: 37992 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsystemd\nUmask:\t0000\nState:\tS (sleeping)\nTgid:\t1\nNgid:\t0\nPid:\t1\nPPid:\t0\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t256\nGroups:\t \nNStgid:\t1\nNSpid:\t1\nNSpgid:\t1\nNSsid:\t1\nVmPeak:\t 35920 kB\nVmSize:\t 35800 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 25920 kB\nVmRSS:\t 25332 kB\nRssAnon:\t 18052 kB\nRssFile:\t 7280 kB\nRssShmem:\t 0 kB\nVmData:\t 16892 kB\nVmStk:\t 1040 kB\nVmExe:\t 40 kB\nVmLib:\t 10680 kB\nVmPTE:\t 112 kB\nVmSwap:\t 672 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t7fe3c0fe28014a03\nSigIgn:\t0000000000001000\nSigCgt:\t00000000000004ec\nCapInh:\t0000003fffffffff\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t854445\nnonvoluntary_ctxt_switches:\t37992\n", error: ""} I, [2025-03-06 11:57:36 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 162 I, [2025-03-06 11:57:36 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:36 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/162/status I, [2025-03-06 11:57:36 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/162/status D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: systemd-journal Umask: 0022 State: S (sleeping) Tgid: 162 Ngid: 104252 Pid: 162 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 162 NSpid: 162 NSpgid: 162 NSsid: 162 VmPeak: 426936 kB VmSize: 348768 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 283184 kB VmRSS: 221268 kB RssAnon: 540 kB RssFile: 5680 kB RssShmem: 215048 kB VmData: 8968 kB VmStk: 132 kB VmExe: 92 kB VmLib: 9728 kB VmPTE: 580 kB VmSwap: 636 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 4/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000400004a02 SigIgn: 0000000000001000 SigCgt: 0000000100000040 CapInh: 0000000000000000 CapPrm: 00000025402800cf CapEff: 00000025402800cf CapBnd: 00000025402800cf CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 20 Speculation_Store_Bypass: thread force mitigated SpeculationIndirectBranch: conditional force disabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 528511 nonvoluntary_ctxt_switches: 1495 D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsystemd-journal\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t162\nNgid:\t104252\nPid:\t162\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t162\nNSpid:\t162\nNSpgid:\t162\nNSsid:\t162\nVmPeak:\t 426936 kB\nVmSize:\t 348768 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 283184 kB\nVmRSS:\t 221268 kB\nRssAnon:\t 540 kB\nRssFile:\t 5680 kB\nRssShmem:\t 215048 kB\nVmData:\t 8968 kB\nVmStk:\t 132 kB\nVmExe:\t 92 kB\nVmLib:\t 9728 kB\nVmPTE:\t 580 kB\nVmSwap:\t 636 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t4/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000400004a02\nSigIgn:\t0000000000001000\nSigCgt:\t0000000100000040\nCapInh:\t0000000000000000\nCapPrm:\t00000025402800cf\nCapEff:\t00000025402800cf\nCapBnd:\t00000025402800cf\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t20\nSpeculation_Store_Bypass:\tthread force mitigated\nSpeculationIndirectBranch:\tconditional force disabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t528511\nnonvoluntary_ctxt_switches:\t1495\n", error: ""} I, [2025-03-06 11:57:36 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 1749 I, [2025-03-06 11:57:36 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:36 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:36 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/1749/status I, [2025-03-06 11:57:37 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/1749/status D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: sleep Umask: 0022 State: S (sleeping) Tgid: 1749 Ngid: 0 Pid: 1749 PPid: 854 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 1 2 3 4 6 10 11 20 26 27 NStgid: 1749 888 NSpid: 1749 888 NSpgid: 854 1 NSsid: 854 1 VmPeak: 3552 kB VmSize: 1532 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 20 kB VmStk: 132 kB VmExe: 788 kB VmLib: 556 kB VmPTE: 40 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000000000 CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 1 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t1749\nNgid:\t0\nPid:\t1749\nPPid:\t854\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t1749\t888\nNSpid:\t1749\t888\nNSpgid:\t854\t1\nNSsid:\t854\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1532 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 20 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 40 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1\nnonvoluntary_ctxt_switches:\t0\n", error: ""} I, [2025-03-06 11:57:37 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 178 I, [2025-03-06 11:57:37 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:37 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/178/status I, [2025-03-06 11:57:37 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/178/status D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: containerd Umask: 0022 State: S (sleeping) Tgid: 178 Ngid: 0 Pid: 178 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 2048 Groups: NStgid: 178 NSpid: 178 NSpgid: 178 NSsid: 178 VmPeak: 7722728 kB VmSize: 7428472 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 134104 kB VmRSS: 86476 kB RssAnon: 61852 kB RssFile: 24624 kB RssShmem: 0 kB VmData: 650428 kB VmStk: 132 kB VmExe: 19352 kB VmLib: 1520 kB VmPTE: 1132 kB VmSwap: 1028 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 58 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 169 nonvoluntary_ctxt_switches: 1 D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t178\nNgid:\t0\nPid:\t178\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t2048\nGroups:\t \nNStgid:\t178\nNSpid:\t178\nNSpgid:\t178\nNSsid:\t178\nVmPeak:\t 7722728 kB\nVmSize:\t 7428472 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 134104 kB\nVmRSS:\t 86476 kB\nRssAnon:\t 61852 kB\nRssFile:\t 24624 kB\nRssShmem:\t 0 kB\nVmData:\t 650428 kB\nVmStk:\t 132 kB\nVmExe:\t 19352 kB\nVmLib:\t 1520 kB\nVmPTE:\t 1132 kB\nVmSwap:\t 1028 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t58\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t169\nnonvoluntary_ctxt_switches:\t1\n", error: ""} I, [2025-03-06 11:57:37 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 284 I, [2025-03-06 11:57:37 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:37 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:37 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/284/status I, [2025-03-06 11:57:38 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/284/status D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: kubelet Umask: 0022 State: S (sleeping) Tgid: 284 Ngid: 114779 Pid: 284 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 256 Groups: NStgid: 284 NSpid: 284 NSpgid: 284 NSsid: 284 VmPeak: 8474868 kB VmSize: 8474868 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 126788 kB VmRSS: 113484 kB RssAnon: 82540 kB RssFile: 30944 kB RssShmem: 0 kB VmData: 962580 kB VmStk: 132 kB VmExe: 35216 kB VmLib: 1556 kB VmPTE: 1284 kB VmSwap: 1864 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 97 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 5932760 nonvoluntary_ctxt_switches: 7048 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tkubelet\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t284\nNgid:\t114779\nPid:\t284\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t256\nGroups:\t \nNStgid:\t284\nNSpid:\t284\nNSpgid:\t284\nNSsid:\t284\nVmPeak:\t 8474868 kB\nVmSize:\t 8474868 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 126788 kB\nVmRSS:\t 113484 kB\nRssAnon:\t 82540 kB\nRssFile:\t 30944 kB\nRssShmem:\t 0 kB\nVmData:\t 962580 kB\nVmStk:\t 132 kB\nVmExe:\t 35216 kB\nVmLib:\t 1556 kB\nVmPTE:\t 1284 kB\nVmSwap:\t 1864 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t97\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t5932760\nnonvoluntary_ctxt_switches:\t7048\n", error: ""} I, [2025-03-06 11:57:38 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3111878 I, [2025-03-06 11:57:38 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:38 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3111878/status I, [2025-03-06 11:57:38 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3111878/status D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 3111878 Ngid: 0 Pid: 3111878 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 3111878 NSpid: 3111878 NSpgid: 3111878 NSsid: 178 VmPeak: 1238568 kB VmSize: 1238568 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 16236 kB VmRSS: 15848 kB RssAnon: 4720 kB RssFile: 11128 kB RssShmem: 0 kB VmData: 45580 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 120 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 12 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 54 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111878\nNgid:\t0\nPid:\t3111878\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t3111878\nNSpid:\t3111878\nNSpgid:\t3111878\nNSsid:\t178\nVmPeak:\t 1238568 kB\nVmSize:\t 1238568 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 16236 kB\nVmRSS:\t 15848 kB\nRssAnon:\t 4720 kB\nRssFile:\t 11128 kB\nRssShmem:\t 0 kB\nVmData:\t 45580 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 120 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t54\nnonvoluntary_ctxt_switches:\t0\n", error: ""} I, [2025-03-06 11:57:38 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3111903 I, [2025-03-06 11:57:38 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:38 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:38 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3111903/status I, [2025-03-06 11:57:39 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3111903/status D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 3111903 Ngid: 0 Pid: 3111903 PPid: 3111878 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 3111903 NSpid: 3111903 NSpgid: 3111903 NSsid: 3111903 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 41 nonvoluntary_ctxt_switches: 7 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111903\nNgid:\t0\nPid:\t3111903\nPPid:\t3111878\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t3111903\nNSpid:\t3111903\nNSpgid:\t3111903\nNSsid:\t3111903\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t41\nnonvoluntary_ctxt_switches:\t7\n", error: ""} I, [2025-03-06 11:57:39 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3111937 I, [2025-03-06 11:57:39 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:39 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3111937/status I, [2025-03-06 11:57:39 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3111937/status D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: sh Umask: 0022 State: S (sleeping) Tgid: 3111937 Ngid: 0 Pid: 3111937 PPid: 3111878 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 3111937 NSpid: 3111937 NSpgid: 3111937 NSsid: 3111937 VmPeak: 2576 kB VmSize: 2576 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 928 kB VmRSS: 928 kB RssAnon: 88 kB RssFile: 840 kB RssShmem: 0 kB VmData: 232 kB VmStk: 132 kB VmExe: 76 kB VmLib: 1520 kB VmPTE: 44 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 4/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000010002 CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 61 nonvoluntary_ctxt_switches: 8 D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsh\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111937\nNgid:\t0\nPid:\t3111937\nPPid:\t3111878\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t3111937\nNSpid:\t3111937\nNSpgid:\t3111937\nNSsid:\t3111937\nVmPeak:\t 2576 kB\nVmSize:\t 2576 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 928 kB\nVmRSS:\t 928 kB\nRssAnon:\t 88 kB\nRssFile:\t 840 kB\nRssShmem:\t 0 kB\nVmData:\t 232 kB\nVmStk:\t 132 kB\nVmExe:\t 76 kB\nVmLib:\t 1520 kB\nVmPTE:\t 44 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t4/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000010002\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t61\nnonvoluntary_ctxt_switches:\t8\n", error: ""} I, [2025-03-06 11:57:39 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3111957 I, [2025-03-06 11:57:39 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:39 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:39 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3111957/status I, [2025-03-06 11:57:40 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3111957/status D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: sleep Umask: 0022 State: S (sleeping) Tgid: 3111957 Ngid: 0 Pid: 3111957 PPid: 3111937 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 3111957 NSpid: 3111957 NSpgid: 3111937 NSsid: 3111937 VmPeak: 2484 kB VmSize: 2484 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 904 kB VmRSS: 904 kB RssAnon: 88 kB RssFile: 816 kB RssShmem: 0 kB VmData: 224 kB VmStk: 132 kB VmExe: 20 kB VmLib: 1520 kB VmPTE: 40 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000000000 CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 4 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111957\nNgid:\t0\nPid:\t3111957\nPPid:\t3111937\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t3111957\nNSpid:\t3111957\nNSpgid:\t3111937\nNSsid:\t3111937\nVmPeak:\t 2484 kB\nVmSize:\t 2484 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 904 kB\nVmRSS:\t 904 kB\nRssAnon:\t 88 kB\nRssFile:\t 816 kB\nRssShmem:\t 0 kB\nVmData:\t 224 kB\nVmStk:\t 132 kB\nVmExe:\t 20 kB\nVmLib:\t 1520 kB\nVmPTE:\t 40 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t4\nnonvoluntary_ctxt_switches:\t0\n", error: ""} I, [2025-03-06 11:57:40 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3112901 I, [2025-03-06 11:57:40 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:40 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3112901/status I, [2025-03-06 11:57:40 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3112901/status D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 3112901 Ngid: 0 Pid: 3112901 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 3112901 NSpid: 3112901 NSpgid: 3112901 NSsid: 178 VmPeak: 1238312 kB VmSize: 1238312 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 14684 kB VmRSS: 14676 kB RssAnon: 3824 kB RssFile: 10852 kB RssShmem: 0 kB VmData: 45324 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 116 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 11 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 9 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3112901\nNgid:\t0\nPid:\t3112901\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t3112901\nNSpid:\t3112901\nNSpgid:\t3112901\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 14684 kB\nVmRSS:\t 14676 kB\nRssAnon:\t 3824 kB\nRssFile:\t 10852 kB\nRssShmem:\t 0 kB\nVmData:\t 45324 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 116 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t11\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", error: ""} I, [2025-03-06 11:57:40 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3112926 I, [2025-03-06 11:57:40 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:40 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:40 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3112926/status I, [2025-03-06 11:57:40 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3112926/status D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 3112926 Ngid: 0 Pid: 3112926 PPid: 3112901 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 3112926 1 NSpid: 3112926 1 NSpgid: 3112926 1 NSsid: 3112926 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 29 nonvoluntary_ctxt_switches: 9 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3112926\nNgid:\t0\nPid:\t3112926\nPPid:\t3112901\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t3112926\t1\nNSpid:\t3112926\t1\nNSpgid:\t3112926\t1\nNSsid:\t3112926\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t29\nnonvoluntary_ctxt_switches:\t9\n", error: ""} I, [2025-03-06 11:57:41 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3112959 I, [2025-03-06 11:57:41 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:41 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3112959/status I, [2025-03-06 11:57:41 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3112959/status D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: chaos-operator Umask: 0022 State: S (sleeping) Tgid: 3112959 Ngid: 0 Pid: 3112959 PPid: 3112901 TracerPid: 0 Uid: 1000 1000 1000 1000 Gid: 1000 1000 1000 1000 FDSize: 64 Groups: 1000 NStgid: 3112959 1 NSpid: 3112959 1 NSpgid: 3112959 1 NSsid: 3112959 1 VmPeak: 1262700 kB VmSize: 1262700 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 38888 kB VmRSS: 38888 kB RssAnon: 15496 kB RssFile: 23392 kB RssShmem: 0 kB VmData: 63428 kB VmStk: 132 kB VmExe: 15232 kB VmLib: 8 kB VmPTE: 200 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 35 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 1215 nonvoluntary_ctxt_switches: 10 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tchaos-operator\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3112959\nNgid:\t0\nPid:\t3112959\nPPid:\t3112901\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t1000\t1000\t1000\t1000\nFDSize:\t64\nGroups:\t1000 \nNStgid:\t3112959\t1\nNSpid:\t3112959\t1\nNSpgid:\t3112959\t1\nNSsid:\t3112959\t1\nVmPeak:\t 1262700 kB\nVmSize:\t 1262700 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 38888 kB\nVmRSS:\t 38888 kB\nRssAnon:\t 15496 kB\nRssFile:\t 23392 kB\nRssShmem:\t 0 kB\nVmData:\t 63428 kB\nVmStk:\t 132 kB\nVmExe:\t 15232 kB\nVmLib:\t 8 kB\nVmPTE:\t 200 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t35\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1215\nnonvoluntary_ctxt_switches:\t10\n", error: ""} I, [2025-03-06 11:57:41 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3113360 I, [2025-03-06 11:57:41 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:41 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:41 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3113360/status I, [2025-03-06 11:57:41 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3113360/status D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 3113360 Ngid: 0 Pid: 3113360 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 3113360 NSpid: 3113360 NSpgid: 3113360 NSsid: 178 VmPeak: 1238312 kB VmSize: 1238312 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 13976 kB VmRSS: 13920 kB RssAnon: 3488 kB RssFile: 10432 kB RssShmem: 0 kB VmData: 41228 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 112 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 11 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 8 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3113360\nNgid:\t0\nPid:\t3113360\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t3113360\nNSpid:\t3113360\nNSpgid:\t3113360\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 13976 kB\nVmRSS:\t 13920 kB\nRssAnon:\t 3488 kB\nRssFile:\t 10432 kB\nRssShmem:\t 0 kB\nVmData:\t 41228 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 112 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t11\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", error: ""} I, [2025-03-06 11:57:42 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3113384 I, [2025-03-06 11:57:42 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:42 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3113384/status I, [2025-03-06 11:57:42 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3113384/status D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 3113384 Ngid: 0 Pid: 3113384 PPid: 3113360 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 3113384 1 NSpid: 3113384 1 NSpgid: 3113384 1 NSsid: 3113384 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 24 nonvoluntary_ctxt_switches: 13 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3113384\nNgid:\t0\nPid:\t3113384\nPPid:\t3113360\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t3113384\t1\nNSpid:\t3113384\t1\nNSpgid:\t3113384\t1\nNSsid:\t3113384\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t24\nnonvoluntary_ctxt_switches:\t13\n", error: ""} I, [2025-03-06 11:57:42 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3113417 I, [2025-03-06 11:57:42 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:42 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:42 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3113417/status I, [2025-03-06 11:57:42 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3113417/status D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: coredns Umask: 0022 State: S (sleeping) Tgid: 3113417 Ngid: 0 Pid: 3113417 PPid: 3113360 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 3113417 1 NSpid: 3113417 1 NSpgid: 3113417 1 NSsid: 3113417 1 VmPeak: 748492 kB VmSize: 748492 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 41412 kB VmRSS: 41412 kB RssAnon: 12648 kB RssFile: 28764 kB RssShmem: 0 kB VmData: 108680 kB VmStk: 132 kB VmExe: 22032 kB VmLib: 8 kB VmPTE: 200 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 22 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffe7fc1feff CapInh: 0000000000000000 CapPrm: 00000000a80425fb CapEff: 00000000a80425fb CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 712 nonvoluntary_ctxt_switches: 15 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcoredns\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3113417\nNgid:\t0\nPid:\t3113417\nPPid:\t3113360\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t3113417\t1\nNSpid:\t3113417\t1\nNSpgid:\t3113417\t1\nNSsid:\t3113417\t1\nVmPeak:\t 748492 kB\nVmSize:\t 748492 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 41412 kB\nVmRSS:\t 41412 kB\nRssAnon:\t 12648 kB\nRssFile:\t 28764 kB\nRssShmem:\t 0 kB\nVmData:\t 108680 kB\nVmStk:\t 132 kB\nVmExe:\t 22032 kB\nVmLib:\t 8 kB\nVmPTE:\t 200 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t22\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffe7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80425fb\nCapEff:\t00000000a80425fb\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t712\nnonvoluntary_ctxt_switches:\t15\n", error: ""} I, [2025-03-06 11:57:43 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3114976 I, [2025-03-06 11:57:43 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:43 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3114976/status I, [2025-03-06 11:57:43 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3114976/status D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: I, [2025-03-06 11:57:43 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec stderr: cat: /proc/3114976/status: No such file or directory command terminated with exit code 1 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[1], output: "", error: "cat: /proc/3114976/status: No such file or directory\ncommand terminated with exit code 1\n"} I, [2025-03-06 11:57:43 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 372 I, [2025-03-06 11:57:43 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:43 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:43 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/372/status I, [2025-03-06 11:57:43 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/372/status D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 372 Ngid: 0 Pid: 372 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 372 NSpid: 372 NSpgid: 372 NSsid: 178 VmPeak: 1238312 kB VmSize: 1238312 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 14124 kB VmRSS: 12904 kB RssAnon: 2612 kB RssFile: 10292 kB RssShmem: 0 kB VmData: 41228 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 116 kB VmSwap: 612 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 13 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 9 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t372\nNgid:\t0\nPid:\t372\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t372\nNSpid:\t372\nNSpgid:\t372\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 14124 kB\nVmRSS:\t 12904 kB\nRssAnon:\t 2612 kB\nRssFile:\t 10292 kB\nRssShmem:\t 0 kB\nVmData:\t 41228 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 116 kB\nVmSwap:\t 612 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", error: ""} I, [2025-03-06 11:57:44 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 384 I, [2025-03-06 11:57:44 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:44 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/384/status I, [2025-03-06 11:57:44 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/384/status D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 384 Ngid: 0 Pid: 384 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 384 NSpid: 384 NSpgid: 384 NSsid: 178 VmPeak: 1238312 kB VmSize: 1238312 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 14288 kB VmRSS: 13628 kB RssAnon: 3176 kB RssFile: 10452 kB RssShmem: 0 kB VmData: 45324 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 120 kB VmSwap: 504 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 13 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 8 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t384\nNgid:\t0\nPid:\t384\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t384\nNSpid:\t384\nNSpgid:\t384\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 14288 kB\nVmRSS:\t 13628 kB\nRssAnon:\t 3176 kB\nRssFile:\t 10452 kB\nRssShmem:\t 0 kB\nVmData:\t 45324 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 120 kB\nVmSwap:\t 504 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", error: ""} I, [2025-03-06 11:57:44 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 423 I, [2025-03-06 11:57:44 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:44 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:44 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/423/status I, [2025-03-06 11:57:44 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/423/status D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 423 Ngid: 0 Pid: 423 PPid: 372 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 423 1 NSpid: 423 1 NSpgid: 423 1 NSsid: 423 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 34 nonvoluntary_ctxt_switches: 8 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t423\nNgid:\t0\nPid:\t423\nPPid:\t372\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t423\t1\nNSpid:\t423\t1\nNSpgid:\t423\t1\nNSsid:\t423\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t34\nnonvoluntary_ctxt_switches:\t8\n", error: ""} I, [2025-03-06 11:57:45 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 430 I, [2025-03-06 11:57:45 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:45 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/430/status I, [2025-03-06 11:57:45 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/430/status D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 430 Ngid: 0 Pid: 430 PPid: 384 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 430 1 NSpid: 430 1 NSpgid: 430 1 NSsid: 430 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 24 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 35 nonvoluntary_ctxt_switches: 11 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t430\nNgid:\t0\nPid:\t430\nPPid:\t384\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t430\t1\nNSpid:\t430\t1\nNSpgid:\t430\t1\nNSsid:\t430\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 24 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t35\nnonvoluntary_ctxt_switches:\t11\n", error: ""} I, [2025-03-06 11:57:45 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 479 I, [2025-03-06 11:57:45 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:45 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:45 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/479/status I, [2025-03-06 11:57:45 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/479/status D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: kube-proxy Umask: 0022 State: S (sleeping) Tgid: 479 Ngid: 331610 Pid: 479 PPid: 372 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 479 1 NSpid: 479 1 NSpgid: 479 1 NSsid: 479 1 VmPeak: 1299688 kB VmSize: 1299688 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 56656 kB VmRSS: 34240 kB RssAnon: 18436 kB RssFile: 15804 kB RssShmem: 0 kB VmData: 78976 kB VmStk: 132 kB VmExe: 30348 kB VmLib: 8 kB VmPTE: 288 kB VmSwap: 472 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 38 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 96966 nonvoluntary_ctxt_switches: 133 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tkube-proxy\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t479\nNgid:\t331610\nPid:\t479\nPPid:\t372\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t479\t1\nNSpid:\t479\t1\nNSpgid:\t479\t1\nNSsid:\t479\t1\nVmPeak:\t 1299688 kB\nVmSize:\t 1299688 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 56656 kB\nVmRSS:\t 34240 kB\nRssAnon:\t 18436 kB\nRssFile:\t 15804 kB\nRssShmem:\t 0 kB\nVmData:\t 78976 kB\nVmStk:\t 132 kB\nVmExe:\t 30348 kB\nVmLib:\t 8 kB\nVmPTE:\t 288 kB\nVmSwap:\t 472 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t38\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t96966\nnonvoluntary_ctxt_switches:\t133\n", error: ""} I, [2025-03-06 11:57:46 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 680 I, [2025-03-06 11:57:46 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:46 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/680/status I, [2025-03-06 11:57:46 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/680/status D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: kindnetd Umask: 0022 State: S (sleeping) Tgid: 680 Ngid: 117220 Pid: 680 PPid: 384 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 680 1 NSpid: 680 1 NSpgid: 680 1 NSsid: 680 1 VmPeak: 1276212 kB VmSize: 1276212 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 40068 kB VmRSS: 24024 kB RssAnon: 13400 kB RssFile: 10624 kB RssShmem: 0 kB VmData: 67572 kB VmStk: 132 kB VmExe: 21148 kB VmLib: 8 kB VmPTE: 248 kB VmSwap: 232 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 41 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba3a00 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 00000000a80435fb CapEff: 00000000a80435fb CapBnd: 00000000a80435fb CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 1091 nonvoluntary_ctxt_switches: 18 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tkindnetd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t680\nNgid:\t117220\nPid:\t680\nPPid:\t384\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t680\t1\nNSpid:\t680\t1\nNSpgid:\t680\t1\nNSsid:\t680\t1\nVmPeak:\t 1276212 kB\nVmSize:\t 1276212 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 40068 kB\nVmRSS:\t 24024 kB\nRssAnon:\t 13400 kB\nRssFile:\t 10624 kB\nRssShmem:\t 0 kB\nVmData:\t 67572 kB\nVmStk:\t 132 kB\nVmExe:\t 21148 kB\nVmLib:\t 8 kB\nVmPTE:\t 248 kB\nVmSwap:\t 232 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t41\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80435fb\nCapEff:\t00000000a80435fb\nCapBnd:\t00000000a80435fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1091\nnonvoluntary_ctxt_switches:\t18\n", error: ""} I, [2025-03-06 11:57:46 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 793 I, [2025-03-06 11:57:46 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:46 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:46 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/793/status I, [2025-03-06 11:57:46 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/793/status D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 793 Ngid: 0 Pid: 793 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 793 NSpid: 793 NSpgid: 793 NSsid: 178 VmPeak: 1238312 kB VmSize: 1238312 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 15024 kB VmRSS: 14408 kB RssAnon: 3488 kB RssFile: 10920 kB RssShmem: 0 kB VmData: 45324 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 124 kB VmSwap: 88 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 13 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 9 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t793\nNgid:\t0\nPid:\t793\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t793\nNSpid:\t793\nNSpgid:\t793\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 15024 kB\nVmRSS:\t 14408 kB\nRssAnon:\t 3488 kB\nRssFile:\t 10920 kB\nRssShmem:\t 0 kB\nVmData:\t 45324 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 124 kB\nVmSwap:\t 88 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", error: ""} I, [2025-03-06 11:57:47 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 818 I, [2025-03-06 11:57:47 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:47 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/818/status I, [2025-03-06 11:57:47 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/818/status D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 818 Ngid: 0 Pid: 818 PPid: 793 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 818 1 NSpid: 818 1 NSpgid: 818 1 NSsid: 818 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 24 nonvoluntary_ctxt_switches: 7 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t818\nNgid:\t0\nPid:\t818\nPPid:\t793\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t818\t1\nNSpid:\t818\t1\nNSpgid:\t818\t1\nNSsid:\t818\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t24\nnonvoluntary_ctxt_switches:\t7\n", error: ""} I, [2025-03-06 11:57:47 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 854 I, [2025-03-06 11:57:47 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:47 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:47 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/854/status I, [2025-03-06 11:57:47 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/854/status D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: sh Umask: 0022 State: S (sleeping) Tgid: 854 Ngid: 0 Pid: 854 PPid: 793 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 1 2 3 4 6 10 11 20 26 27 NStgid: 854 1 NSpid: 854 1 NSpgid: 854 1 NSsid: 854 1 VmPeak: 3552 kB VmSize: 1564 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 972 kB VmRSS: 84 kB RssAnon: 80 kB RssFile: 4 kB RssShmem: 0 kB VmData: 52 kB VmStk: 132 kB VmExe: 788 kB VmLib: 556 kB VmPTE: 44 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000004 SigCgt: 0000000000010002 CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 906 nonvoluntary_ctxt_switches: 9 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsh\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t854\nNgid:\t0\nPid:\t854\nPPid:\t793\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t854\t1\nNSpid:\t854\t1\nNSpgid:\t854\t1\nNSsid:\t854\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1564 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 972 kB\nVmRSS:\t 84 kB\nRssAnon:\t 80 kB\nRssFile:\t 4 kB\nRssShmem:\t 0 kB\nVmData:\t 52 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 44 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000004\nSigCgt:\t0000000000010002\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t906\nnonvoluntary_ctxt_switches:\t9\n", error: ""} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: proc process_statuses_by_node: ["Name:\tsystemd\nUmask:\t0000\nState:\tS (sleeping)\nTgid:\t1\nNgid:\t0\nPid:\t1\nPPid:\t0\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t256\nGroups:\t \nNStgid:\t1\nNSpid:\t1\nNSpgid:\t1\nNSsid:\t1\nVmPeak:\t 35920 kB\nVmSize:\t 35800 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 25920 kB\nVmRSS:\t 25332 kB\nRssAnon:\t 18052 kB\nRssFile:\t 7280 kB\nRssShmem:\t 0 kB\nVmData:\t 16892 kB\nVmStk:\t 1040 kB\nVmExe:\t 40 kB\nVmLib:\t 10680 kB\nVmPTE:\t 112 kB\nVmSwap:\t 672 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t7fe3c0fe28014a03\nSigIgn:\t0000000000001000\nSigCgt:\t00000000000004ec\nCapInh:\t0000003fffffffff\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t854445\nnonvoluntary_ctxt_switches:\t37992\n", "Name:\tsystemd-journal\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t162\nNgid:\t104252\nPid:\t162\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t162\nNSpid:\t162\nNSpgid:\t162\nNSsid:\t162\nVmPeak:\t 426936 kB\nVmSize:\t 348768 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 283184 kB\nVmRSS:\t 221268 kB\nRssAnon:\t 540 kB\nRssFile:\t 5680 kB\nRssShmem:\t 215048 kB\nVmData:\t 8968 kB\nVmStk:\t 132 kB\nVmExe:\t 92 kB\nVmLib:\t 9728 kB\nVmPTE:\t 580 kB\nVmSwap:\t 636 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t4/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000400004a02\nSigIgn:\t0000000000001000\nSigCgt:\t0000000100000040\nCapInh:\t0000000000000000\nCapPrm:\t00000025402800cf\nCapEff:\t00000025402800cf\nCapBnd:\t00000025402800cf\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t20\nSpeculation_Store_Bypass:\tthread force mitigated\nSpeculationIndirectBranch:\tconditional force disabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t528511\nnonvoluntary_ctxt_switches:\t1495\n", "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t1749\nNgid:\t0\nPid:\t1749\nPPid:\t854\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t1749\t888\nNSpid:\t1749\t888\nNSpgid:\t854\t1\nNSsid:\t854\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1532 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 20 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 40 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tcontainerd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t178\nNgid:\t0\nPid:\t178\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t2048\nGroups:\t \nNStgid:\t178\nNSpid:\t178\nNSpgid:\t178\nNSsid:\t178\nVmPeak:\t 7722728 kB\nVmSize:\t 7428472 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 134104 kB\nVmRSS:\t 86476 kB\nRssAnon:\t 61852 kB\nRssFile:\t 24624 kB\nRssShmem:\t 0 kB\nVmData:\t 650428 kB\nVmStk:\t 132 kB\nVmExe:\t 19352 kB\nVmLib:\t 1520 kB\nVmPTE:\t 1132 kB\nVmSwap:\t 1028 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t58\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t169\nnonvoluntary_ctxt_switches:\t1\n", "Name:\tkubelet\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t284\nNgid:\t114779\nPid:\t284\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t256\nGroups:\t \nNStgid:\t284\nNSpid:\t284\nNSpgid:\t284\nNSsid:\t284\nVmPeak:\t 8474868 kB\nVmSize:\t 8474868 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 126788 kB\nVmRSS:\t 113484 kB\nRssAnon:\t 82540 kB\nRssFile:\t 30944 kB\nRssShmem:\t 0 kB\nVmData:\t 962580 kB\nVmStk:\t 132 kB\nVmExe:\t 35216 kB\nVmLib:\t 1556 kB\nVmPTE:\t 1284 kB\nVmSwap:\t 1864 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t97\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t5932760\nnonvoluntary_ctxt_switches:\t7048\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111878\nNgid:\t0\nPid:\t3111878\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t3111878\nNSpid:\t3111878\nNSpgid:\t3111878\nNSsid:\t178\nVmPeak:\t 1238568 kB\nVmSize:\t 1238568 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 16236 kB\nVmRSS:\t 15848 kB\nRssAnon:\t 4720 kB\nRssFile:\t 11128 kB\nRssShmem:\t 0 kB\nVmData:\t 45580 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 120 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t54\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111903\nNgid:\t0\nPid:\t3111903\nPPid:\t3111878\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t3111903\nNSpid:\t3111903\nNSpgid:\t3111903\nNSsid:\t3111903\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t41\nnonvoluntary_ctxt_switches:\t7\n", "Name:\tsh\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111937\nNgid:\t0\nPid:\t3111937\nPPid:\t3111878\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t3111937\nNSpid:\t3111937\nNSpgid:\t3111937\nNSsid:\t3111937\nVmPeak:\t 2576 kB\nVmSize:\t 2576 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 928 kB\nVmRSS:\t 928 kB\nRssAnon:\t 88 kB\nRssFile:\t 840 kB\nRssShmem:\t 0 kB\nVmData:\t 232 kB\nVmStk:\t 132 kB\nVmExe:\t 76 kB\nVmLib:\t 1520 kB\nVmPTE:\t 44 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t4/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000010002\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t61\nnonvoluntary_ctxt_switches:\t8\n", "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111957\nNgid:\t0\nPid:\t3111957\nPPid:\t3111937\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t3111957\nNSpid:\t3111957\nNSpgid:\t3111937\nNSsid:\t3111937\nVmPeak:\t 2484 kB\nVmSize:\t 2484 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 904 kB\nVmRSS:\t 904 kB\nRssAnon:\t 88 kB\nRssFile:\t 816 kB\nRssShmem:\t 0 kB\nVmData:\t 224 kB\nVmStk:\t 132 kB\nVmExe:\t 20 kB\nVmLib:\t 1520 kB\nVmPTE:\t 40 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t4\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3112901\nNgid:\t0\nPid:\t3112901\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t3112901\nNSpid:\t3112901\nNSpgid:\t3112901\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 14684 kB\nVmRSS:\t 14676 kB\nRssAnon:\t 3824 kB\nRssFile:\t 10852 kB\nRssShmem:\t 0 kB\nVmData:\t 45324 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 116 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t11\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3112926\nNgid:\t0\nPid:\t3112926\nPPid:\t3112901\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t3112926\t1\nNSpid:\t3112926\t1\nNSpgid:\t3112926\t1\nNSsid:\t3112926\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t29\nnonvoluntary_ctxt_switches:\t9\n", "Name:\tchaos-operator\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3112959\nNgid:\t0\nPid:\t3112959\nPPid:\t3112901\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t1000\t1000\t1000\t1000\nFDSize:\t64\nGroups:\t1000 \nNStgid:\t3112959\t1\nNSpid:\t3112959\t1\nNSpgid:\t3112959\t1\nNSsid:\t3112959\t1\nVmPeak:\t 1262700 kB\nVmSize:\t 1262700 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 38888 kB\nVmRSS:\t 38888 kB\nRssAnon:\t 15496 kB\nRssFile:\t 23392 kB\nRssShmem:\t 0 kB\nVmData:\t 63428 kB\nVmStk:\t 132 kB\nVmExe:\t 15232 kB\nVmLib:\t 8 kB\nVmPTE:\t 200 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t35\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1215\nnonvoluntary_ctxt_switches:\t10\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3113360\nNgid:\t0\nPid:\t3113360\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t3113360\nNSpid:\t3113360\nNSpgid:\t3113360\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 13976 kB\nVmRSS:\t 13920 kB\nRssAnon:\t 3488 kB\nRssFile:\t 10432 kB\nRssShmem:\t 0 kB\nVmData:\t 41228 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 112 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t11\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3113384\nNgid:\t0\nPid:\t3113384\nPPid:\t3113360\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t3113384\t1\nNSpid:\t3113384\t1\nNSpgid:\t3113384\t1\nNSsid:\t3113384\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t24\nnonvoluntary_ctxt_switches:\t13\n", "Name:\tcoredns\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3113417\nNgid:\t0\nPid:\t3113417\nPPid:\t3113360\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t3113417\t1\nNSpid:\t3113417\t1\nNSpgid:\t3113417\t1\nNSsid:\t3113417\t1\nVmPeak:\t 748492 kB\nVmSize:\t 748492 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 41412 kB\nVmRSS:\t 41412 kB\nRssAnon:\t 12648 kB\nRssFile:\t 28764 kB\nRssShmem:\t 0 kB\nVmData:\t 108680 kB\nVmStk:\t 132 kB\nVmExe:\t 22032 kB\nVmLib:\t 8 kB\nVmPTE:\t 200 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t22\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffe7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80425fb\nCapEff:\t00000000a80425fb\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t712\nnonvoluntary_ctxt_switches:\t15\n", "", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t372\nNgid:\t0\nPid:\t372\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t372\nNSpid:\t372\nNSpgid:\t372\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 14124 kB\nVmRSS:\t 12904 kB\nRssAnon:\t 2612 kB\nRssFile:\t 10292 kB\nRssShmem:\t 0 kB\nVmData:\t 41228 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 116 kB\nVmSwap:\t 612 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t384\nNgid:\t0\nPid:\t384\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t384\nNSpid:\t384\nNSpgid:\t384\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 14288 kB\nVmRSS:\t 13628 kB\nRssAnon:\t 3176 kB\nRssFile:\t 10452 kB\nRssShmem:\t 0 kB\nVmData:\t 45324 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 120 kB\nVmSwap:\t 504 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t423\nNgid:\t0\nPid:\t423\nPPid:\t372\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t423\t1\nNSpid:\t423\t1\nNSpgid:\t423\t1\nNSsid:\t423\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t34\nnonvoluntary_ctxt_switches:\t8\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t430\nNgid:\t0\nPid:\t430\nPPid:\t384\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t430\t1\nNSpid:\t430\t1\nNSpgid:\t430\t1\nNSsid:\t430\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 24 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t35\nnonvoluntary_ctxt_switches:\t11\n", "Name:\tkube-proxy\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t479\nNgid:\t331610\nPid:\t479\nPPid:\t372\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t479\t1\nNSpid:\t479\t1\nNSpgid:\t479\t1\nNSsid:\t479\t1\nVmPeak:\t 1299688 kB\nVmSize:\t 1299688 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 56656 kB\nVmRSS:\t 34240 kB\nRssAnon:\t 18436 kB\nRssFile:\t 15804 kB\nRssShmem:\t 0 kB\nVmData:\t 78976 kB\nVmStk:\t 132 kB\nVmExe:\t 30348 kB\nVmLib:\t 8 kB\nVmPTE:\t 288 kB\nVmSwap:\t 472 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t38\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t96966\nnonvoluntary_ctxt_switches:\t133\n", "Name:\tkindnetd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t680\nNgid:\t117220\nPid:\t680\nPPid:\t384\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t680\t1\nNSpid:\t680\t1\nNSpgid:\t680\t1\nNSsid:\t680\t1\nVmPeak:\t 1276212 kB\nVmSize:\t 1276212 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 40068 kB\nVmRSS:\t 24024 kB\nRssAnon:\t 13400 kB\nRssFile:\t 10624 kB\nRssShmem:\t 0 kB\nVmData:\t 67572 kB\nVmStk:\t 132 kB\nVmExe:\t 21148 kB\nVmLib:\t 8 kB\nVmPTE:\t 248 kB\nVmSwap:\t 232 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t41\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80435fb\nCapEff:\t00000000a80435fb\nCapBnd:\t00000000a80435fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1091\nnonvoluntary_ctxt_switches:\t18\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t793\nNgid:\t0\nPid:\t793\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t793\nNSpid:\t793\nNSpgid:\t793\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 15024 kB\nVmRSS:\t 14408 kB\nRssAnon:\t 3488 kB\nRssFile:\t 10920 kB\nRssShmem:\t 0 kB\nVmData:\t 45324 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 124 kB\nVmSwap:\t 88 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t818\nNgid:\t0\nPid:\t818\nPPid:\t793\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t818\t1\nNSpid:\t818\t1\nNSpgid:\t818\t1\nNSsid:\t818\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t24\nnonvoluntary_ctxt_switches:\t7\n", "Name:\tsh\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t854\nNgid:\t0\nPid:\t854\nPPid:\t793\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t854\t1\nNSpid:\t854\t1\nNSpgid:\t854\t1\nNSsid:\t854\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1564 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 972 kB\nVmRSS:\t 84 kB\nRssAnon:\t 80 kB\nRssFile:\t 4 kB\nRssShmem:\t 0 kB\nVmData:\t 52 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 44 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000004\nSigCgt:\t0000000000010002\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t906\nnonvoluntary_ctxt_switches:\t9\n"] I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite-proctree_by_pid: proctree_by_pid potential_parent_pid: 3113417 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: proc_statuses: ["Name:\tsystemd\nUmask:\t0000\nState:\tS (sleeping)\nTgid:\t1\nNgid:\t0\nPid:\t1\nPPid:\t0\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t256\nGroups:\t \nNStgid:\t1\nNSpid:\t1\nNSpgid:\t1\nNSsid:\t1\nVmPeak:\t 35920 kB\nVmSize:\t 35800 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 25920 kB\nVmRSS:\t 25332 kB\nRssAnon:\t 18052 kB\nRssFile:\t 7280 kB\nRssShmem:\t 0 kB\nVmData:\t 16892 kB\nVmStk:\t 1040 kB\nVmExe:\t 40 kB\nVmLib:\t 10680 kB\nVmPTE:\t 112 kB\nVmSwap:\t 672 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t7fe3c0fe28014a03\nSigIgn:\t0000000000001000\nSigCgt:\t00000000000004ec\nCapInh:\t0000003fffffffff\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t854445\nnonvoluntary_ctxt_switches:\t37992\n", "Name:\tsystemd-journal\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t162\nNgid:\t104252\nPid:\t162\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t162\nNSpid:\t162\nNSpgid:\t162\nNSsid:\t162\nVmPeak:\t 426936 kB\nVmSize:\t 348768 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 283184 kB\nVmRSS:\t 221268 kB\nRssAnon:\t 540 kB\nRssFile:\t 5680 kB\nRssShmem:\t 215048 kB\nVmData:\t 8968 kB\nVmStk:\t 132 kB\nVmExe:\t 92 kB\nVmLib:\t 9728 kB\nVmPTE:\t 580 kB\nVmSwap:\t 636 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t4/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000400004a02\nSigIgn:\t0000000000001000\nSigCgt:\t0000000100000040\nCapInh:\t0000000000000000\nCapPrm:\t00000025402800cf\nCapEff:\t00000025402800cf\nCapBnd:\t00000025402800cf\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t20\nSpeculation_Store_Bypass:\tthread force mitigated\nSpeculationIndirectBranch:\tconditional force disabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t528511\nnonvoluntary_ctxt_switches:\t1495\n", "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t1749\nNgid:\t0\nPid:\t1749\nPPid:\t854\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t1749\t888\nNSpid:\t1749\t888\nNSpgid:\t854\t1\nNSsid:\t854\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1532 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 20 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 40 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tcontainerd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t178\nNgid:\t0\nPid:\t178\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t2048\nGroups:\t \nNStgid:\t178\nNSpid:\t178\nNSpgid:\t178\nNSsid:\t178\nVmPeak:\t 7722728 kB\nVmSize:\t 7428472 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 134104 kB\nVmRSS:\t 86476 kB\nRssAnon:\t 61852 kB\nRssFile:\t 24624 kB\nRssShmem:\t 0 kB\nVmData:\t 650428 kB\nVmStk:\t 132 kB\nVmExe:\t 19352 kB\nVmLib:\t 1520 kB\nVmPTE:\t 1132 kB\nVmSwap:\t 1028 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t58\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t169\nnonvoluntary_ctxt_switches:\t1\n", "Name:\tkubelet\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t284\nNgid:\t114779\nPid:\t284\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t256\nGroups:\t \nNStgid:\t284\nNSpid:\t284\nNSpgid:\t284\nNSsid:\t284\nVmPeak:\t 8474868 kB\nVmSize:\t 8474868 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 126788 kB\nVmRSS:\t 113484 kB\nRssAnon:\t 82540 kB\nRssFile:\t 30944 kB\nRssShmem:\t 0 kB\nVmData:\t 962580 kB\nVmStk:\t 132 kB\nVmExe:\t 35216 kB\nVmLib:\t 1556 kB\nVmPTE:\t 1284 kB\nVmSwap:\t 1864 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t97\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t5932760\nnonvoluntary_ctxt_switches:\t7048\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111878\nNgid:\t0\nPid:\t3111878\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t3111878\nNSpid:\t3111878\nNSpgid:\t3111878\nNSsid:\t178\nVmPeak:\t 1238568 kB\nVmSize:\t 1238568 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 16236 kB\nVmRSS:\t 15848 kB\nRssAnon:\t 4720 kB\nRssFile:\t 11128 kB\nRssShmem:\t 0 kB\nVmData:\t 45580 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 120 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t54\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111903\nNgid:\t0\nPid:\t3111903\nPPid:\t3111878\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t3111903\nNSpid:\t3111903\nNSpgid:\t3111903\nNSsid:\t3111903\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t41\nnonvoluntary_ctxt_switches:\t7\n", "Name:\tsh\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111937\nNgid:\t0\nPid:\t3111937\nPPid:\t3111878\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t3111937\nNSpid:\t3111937\nNSpgid:\t3111937\nNSsid:\t3111937\nVmPeak:\t 2576 kB\nVmSize:\t 2576 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 928 kB\nVmRSS:\t 928 kB\nRssAnon:\t 88 kB\nRssFile:\t 840 kB\nRssShmem:\t 0 kB\nVmData:\t 232 kB\nVmStk:\t 132 kB\nVmExe:\t 76 kB\nVmLib:\t 1520 kB\nVmPTE:\t 44 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t4/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000010002\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t61\nnonvoluntary_ctxt_switches:\t8\n", "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111957\nNgid:\t0\nPid:\t3111957\nPPid:\t3111937\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t3111957\nNSpid:\t3111957\nNSpgid:\t3111937\nNSsid:\t3111937\nVmPeak:\t 2484 kB\nVmSize:\t 2484 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 904 kB\nVmRSS:\t 904 kB\nRssAnon:\t 88 kB\nRssFile:\t 816 kB\nRssShmem:\t 0 kB\nVmData:\t 224 kB\nVmStk:\t 132 kB\nVmExe:\t 20 kB\nVmLib:\t 1520 kB\nVmPTE:\t 40 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t4\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3112901\nNgid:\t0\nPid:\t3112901\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t3112901\nNSpid:\t3112901\nNSpgid:\t3112901\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 14684 kB\nVmRSS:\t 14676 kB\nRssAnon:\t 3824 kB\nRssFile:\t 10852 kB\nRssShmem:\t 0 kB\nVmData:\t 45324 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 116 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t11\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3112926\nNgid:\t0\nPid:\t3112926\nPPid:\t3112901\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t3112926\t1\nNSpid:\t3112926\t1\nNSpgid:\t3112926\t1\nNSsid:\t3112926\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t29\nnonvoluntary_ctxt_switches:\t9\n", "Name:\tchaos-operator\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3112959\nNgid:\t0\nPid:\t3112959\nPPid:\t3112901\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t1000\t1000\t1000\t1000\nFDSize:\t64\nGroups:\t1000 \nNStgid:\t3112959\t1\nNSpid:\t3112959\t1\nNSpgid:\t3112959\t1\nNSsid:\t3112959\t1\nVmPeak:\t 1262700 kB\nVmSize:\t 1262700 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 38888 kB\nVmRSS:\t 38888 kB\nRssAnon:\t 15496 kB\nRssFile:\t 23392 kB\nRssShmem:\t 0 kB\nVmData:\t 63428 kB\nVmStk:\t 132 kB\nVmExe:\t 15232 kB\nVmLib:\t 8 kB\nVmPTE:\t 200 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t35\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1215\nnonvoluntary_ctxt_switches:\t10\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3113360\nNgid:\t0\nPid:\t3113360\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t3113360\nNSpid:\t3113360\nNSpgid:\t3113360\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 13976 kB\nVmRSS:\t 13920 kB\nRssAnon:\t 3488 kB\nRssFile:\t 10432 kB\nRssShmem:\t 0 kB\nVmData:\t 41228 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 112 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t11\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3113384\nNgid:\t0\nPid:\t3113384\nPPid:\t3113360\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t3113384\t1\nNSpid:\t3113384\t1\nNSpgid:\t3113384\t1\nNSsid:\t3113384\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t24\nnonvoluntary_ctxt_switches:\t13\n", "Name:\tcoredns\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3113417\nNgid:\t0\nPid:\t3113417\nPPid:\t3113360\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t3113417\t1\nNSpid:\t3113417\t1\nNSpgid:\t3113417\t1\nNSsid:\t3113417\t1\nVmPeak:\t 748492 kB\nVmSize:\t 748492 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 41412 kB\nVmRSS:\t 41412 kB\nRssAnon:\t 12648 kB\nRssFile:\t 28764 kB\nRssShmem:\t 0 kB\nVmData:\t 108680 kB\nVmStk:\t 132 kB\nVmExe:\t 22032 kB\nVmLib:\t 8 kB\nVmPTE:\t 200 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t22\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffe7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80425fb\nCapEff:\t00000000a80425fb\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t712\nnonvoluntary_ctxt_switches:\t15\n", "", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t372\nNgid:\t0\nPid:\t372\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t372\nNSpid:\t372\nNSpgid:\t372\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 14124 kB\nVmRSS:\t 12904 kB\nRssAnon:\t 2612 kB\nRssFile:\t 10292 kB\nRssShmem:\t 0 kB\nVmData:\t 41228 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 116 kB\nVmSwap:\t 612 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t384\nNgid:\t0\nPid:\t384\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t384\nNSpid:\t384\nNSpgid:\t384\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 14288 kB\nVmRSS:\t 13628 kB\nRssAnon:\t 3176 kB\nRssFile:\t 10452 kB\nRssShmem:\t 0 kB\nVmData:\t 45324 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 120 kB\nVmSwap:\t 504 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t423\nNgid:\t0\nPid:\t423\nPPid:\t372\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t423\t1\nNSpid:\t423\t1\nNSpgid:\t423\t1\nNSsid:\t423\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t34\nnonvoluntary_ctxt_switches:\t8\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t430\nNgid:\t0\nPid:\t430\nPPid:\t384\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t430\t1\nNSpid:\t430\t1\nNSpgid:\t430\t1\nNSsid:\t430\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 24 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t35\nnonvoluntary_ctxt_switches:\t11\n", "Name:\tkube-proxy\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t479\nNgid:\t331610\nPid:\t479\nPPid:\t372\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t479\t1\nNSpid:\t479\t1\nNSpgid:\t479\t1\nNSsid:\t479\t1\nVmPeak:\t 1299688 kB\nVmSize:\t 1299688 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 56656 kB\nVmRSS:\t 34240 kB\nRssAnon:\t 18436 kB\nRssFile:\t 15804 kB\nRssShmem:\t 0 kB\nVmData:\t 78976 kB\nVmStk:\t 132 kB\nVmExe:\t 30348 kB\nVmLib:\t 8 kB\nVmPTE:\t 288 kB\nVmSwap:\t 472 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t38\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t96966\nnonvoluntary_ctxt_switches:\t133\n", "Name:\tkindnetd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t680\nNgid:\t117220\nPid:\t680\nPPid:\t384\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t680\t1\nNSpid:\t680\t1\nNSpgid:\t680\t1\nNSsid:\t680\t1\nVmPeak:\t 1276212 kB\nVmSize:\t 1276212 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 40068 kB\nVmRSS:\t 24024 kB\nRssAnon:\t 13400 kB\nRssFile:\t 10624 kB\nRssShmem:\t 0 kB\nVmData:\t 67572 kB\nVmStk:\t 132 kB\nVmExe:\t 21148 kB\nVmLib:\t 8 kB\nVmPTE:\t 248 kB\nVmSwap:\t 232 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t41\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80435fb\nCapEff:\t00000000a80435fb\nCapBnd:\t00000000a80435fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1091\nnonvoluntary_ctxt_switches:\t18\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t793\nNgid:\t0\nPid:\t793\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t793\nNSpid:\t793\nNSpgid:\t793\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 15024 kB\nVmRSS:\t 14408 kB\nRssAnon:\t 3488 kB\nRssFile:\t 10920 kB\nRssShmem:\t 0 kB\nVmData:\t 45324 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 124 kB\nVmSwap:\t 88 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t818\nNgid:\t0\nPid:\t818\nPPid:\t793\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t818\t1\nNSpid:\t818\t1\nNSpgid:\t818\t1\nNSsid:\t818\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t24\nnonvoluntary_ctxt_switches:\t7\n", "Name:\tsh\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t854\nNgid:\t0\nPid:\t854\nPPid:\t793\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t854\t1\nNSpid:\t854\t1\nNSpgid:\t854\t1\nNSsid:\t854\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1564 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 972 kB\nVmRSS:\t 84 kB\nRssAnon:\t 80 kB\nRssFile:\t 4 kB\nRssShmem:\t 0 kB\nVmData:\t 52 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 44 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000004\nSigCgt:\t0000000000010002\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t906\nnonvoluntary_ctxt_switches:\t9\n"] D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: systemd Umask: 0000 State: S (sleeping) Tgid: 1 Ngid: 0 Pid: 1 PPid: 0 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 256 Groups: NStgid: 1 NSpid: 1 NSpgid: 1 NSsid: 1 VmPeak: 35920 kB VmSize: 35800 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 25920 kB VmRSS: 25332 kB RssAnon: 18052 kB RssFile: 7280 kB RssShmem: 0 kB VmData: 16892 kB VmStk: 1040 kB VmExe: 40 kB VmLib: 10680 kB VmPTE: 112 kB VmSwap: 672 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 7fe3c0fe28014a03 SigIgn: 0000000000001000 SigCgt: 00000000000004ec CapInh: 0000003fffffffff CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 854445 nonvoluntary_ctxt_switches: 37992 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "systemd", "Umask" => "0000", "State" => "S (sleeping)", "Tgid" => "1", "Ngid" => "0", "Pid" => "1", "PPid" => "0", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "256", "Groups" => "", "NStgid" => "1", "NSpid" => "1", "NSpgid" => "1", "NSsid" => "1", "VmPeak" => "35920 kB", "VmSize" => "35800 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "25920 kB", "VmRSS" => "25332 kB", "RssAnon" => "18052 kB", "RssFile" => "7280 kB", "RssShmem" => "0 kB", "VmData" => "16892 kB", "VmStk" => "1040 kB", "VmExe" => "40 kB", "VmLib" => "10680 kB", "VmPTE" => "112 kB", "VmSwap" => "672 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "7fe3c0fe28014a03", "SigIgn" => "0000000000001000", "SigCgt" => "00000000000004ec", "CapInh" => "0000003fffffffff", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "854445", "nonvoluntary_ctxt_switches" => "37992"} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: systemd-journal Umask: 0022 State: S (sleeping) Tgid: 162 Ngid: 104252 Pid: 162 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 162 NSpid: 162 NSpgid: 162 NSsid: 162 VmPeak: 426936 kB VmSize: 348768 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 283184 kB VmRSS: 221268 kB RssAnon: 540 kB RssFile: 5680 kB RssShmem: 215048 kB VmData: 8968 kB VmStk: 132 kB VmExe: 92 kB VmLib: 9728 kB VmPTE: 580 kB VmSwap: 636 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 4/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000400004a02 SigIgn: 0000000000001000 SigCgt: 0000000100000040 CapInh: 0000000000000000 CapPrm: 00000025402800cf CapEff: 00000025402800cf CapBnd: 00000025402800cf CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 20 Speculation_Store_Bypass: thread force mitigated SpeculationIndirectBranch: conditional force disabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 528511 nonvoluntary_ctxt_switches: 1495 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "systemd-journal", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "162", "Ngid" => "104252", "Pid" => "162", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "", "NStgid" => "162", "NSpid" => "162", "NSpgid" => "162", "NSsid" => "162", "VmPeak" => "426936 kB", "VmSize" => "348768 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "283184 kB", "VmRSS" => "221268 kB", "RssAnon" => "540 kB", "RssFile" => "5680 kB", "RssShmem" => "215048 kB", "VmData" => "8968 kB", "VmStk" => "132 kB", "VmExe" => "92 kB", "VmLib" => "9728 kB", "VmPTE" => "580 kB", "VmSwap" => "636 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "4/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000400004a02", "SigIgn" => "0000000000001000", "SigCgt" => "0000000100000040", "CapInh" => "0000000000000000", "CapPrm" => "00000025402800cf", "CapEff" => "00000025402800cf", "CapBnd" => "00000025402800cf", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "2", "Seccomp_filters" => "20", "Speculation_Store_Bypass" => "thread force mitigated", "SpeculationIndirectBranch" => "conditional force disabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "528511", "nonvoluntary_ctxt_switches" => "1495"} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: sleep Umask: 0022 State: S (sleeping) Tgid: 1749 Ngid: 0 Pid: 1749 PPid: 854 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 1 2 3 4 6 10 11 20 26 27 NStgid: 1749 888 NSpid: 1749 888 NSpgid: 854 1 NSsid: 854 1 VmPeak: 3552 kB VmSize: 1532 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 20 kB VmStk: 132 kB VmExe: 788 kB VmLib: 556 kB VmPTE: 40 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000000000 CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 1 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "sleep", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "1749", "Ngid" => "0", "Pid" => "1749", "PPid" => "854", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0 1 2 3 4 6 10 11 20 26 27", "NStgid" => "1749\t888", "NSpid" => "1749\t888", "NSpgid" => "854\t1", "NSsid" => "854\t1", "VmPeak" => "3552 kB", "VmSize" => "1532 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "20 kB", "VmStk" => "132 kB", "VmExe" => "788 kB", "VmLib" => "556 kB", "VmPTE" => "40 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000000000", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "1", "nonvoluntary_ctxt_switches" => "0"} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: containerd Umask: 0022 State: S (sleeping) Tgid: 178 Ngid: 0 Pid: 178 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 2048 Groups: NStgid: 178 NSpid: 178 NSpgid: 178 NSsid: 178 VmPeak: 7722728 kB VmSize: 7428472 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 134104 kB VmRSS: 86476 kB RssAnon: 61852 kB RssFile: 24624 kB RssShmem: 0 kB VmData: 650428 kB VmStk: 132 kB VmExe: 19352 kB VmLib: 1520 kB VmPTE: 1132 kB VmSwap: 1028 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 58 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 169 nonvoluntary_ctxt_switches: 1 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "containerd", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "178", "Ngid" => "0", "Pid" => "178", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "2048", "Groups" => "", "NStgid" => "178", "NSpid" => "178", "NSpgid" => "178", "NSsid" => "178", "VmPeak" => "7722728 kB", "VmSize" => "7428472 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "134104 kB", "VmRSS" => "86476 kB", "RssAnon" => "61852 kB", "RssFile" => "24624 kB", "RssShmem" => "0 kB", "VmData" => "650428 kB", "VmStk" => "132 kB", "VmExe" => "19352 kB", "VmLib" => "1520 kB", "VmPTE" => "1132 kB", "VmSwap" => "1028 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "58", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "169", "nonvoluntary_ctxt_switches" => "1"} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: kubelet Umask: 0022 State: S (sleeping) Tgid: 284 Ngid: 114779 Pid: 284 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 256 Groups: NStgid: 284 NSpid: 284 NSpgid: 284 NSsid: 284 VmPeak: 8474868 kB VmSize: 8474868 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 126788 kB VmRSS: 113484 kB RssAnon: 82540 kB RssFile: 30944 kB RssShmem: 0 kB VmData: 962580 kB VmStk: 132 kB VmExe: 35216 kB VmLib: 1556 kB VmPTE: 1284 kB VmSwap: 1864 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 97 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 5932760 nonvoluntary_ctxt_switches: 7048 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "kubelet", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "284", "Ngid" => "114779", "Pid" => "284", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "256", "Groups" => "", "NStgid" => "284", "NSpid" => "284", "NSpgid" => "284", "NSsid" => "284", "VmPeak" => "8474868 kB", "VmSize" => "8474868 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "126788 kB", "VmRSS" => "113484 kB", "RssAnon" => "82540 kB", "RssFile" => "30944 kB", "RssShmem" => "0 kB", "VmData" => "962580 kB", "VmStk" => "132 kB", "VmExe" => "35216 kB", "VmLib" => "1556 kB", "VmPTE" => "1284 kB", "VmSwap" => "1864 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "97", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "5932760", "nonvoluntary_ctxt_switches" => "7048"} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 3111878 Ngid: 0 Pid: 3111878 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 3111878 NSpid: 3111878 NSpgid: 3111878 NSsid: 178 VmPeak: 1238568 kB VmSize: 1238568 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 16236 kB VmRSS: 15848 kB RssAnon: 4720 kB RssFile: 11128 kB RssShmem: 0 kB VmData: 45580 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 120 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 12 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 54 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3111878", "Ngid" => "0", "Pid" => "3111878", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "", "NStgid" => "3111878", "NSpid" => "3111878", "NSpgid" => "3111878", "NSsid" => "178", "VmPeak" => "1238568 kB", "VmSize" => "1238568 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "16236 kB", "VmRSS" => "15848 kB", "RssAnon" => "4720 kB", "RssFile" => "11128 kB", "RssShmem" => "0 kB", "VmData" => "45580 kB", "VmStk" => "132 kB", "VmExe" => "5628 kB", "VmLib" => "8 kB", "VmPTE" => "120 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "12", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "54", "nonvoluntary_ctxt_switches" => "0"} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 3111903 Ngid: 0 Pid: 3111903 PPid: 3111878 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 3111903 NSpid: 3111903 NSpgid: 3111903 NSsid: 3111903 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 41 nonvoluntary_ctxt_switches: 7 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3111903", "Ngid" => "0", "Pid" => "3111903", "PPid" => "3111878", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "3111903", "NSpid" => "3111903", "NSpgid" => "3111903", "NSsid" => "3111903", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "28 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "41", "nonvoluntary_ctxt_switches" => "7"} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: sh Umask: 0022 State: S (sleeping) Tgid: 3111937 Ngid: 0 Pid: 3111937 PPid: 3111878 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 3111937 NSpid: 3111937 NSpgid: 3111937 NSsid: 3111937 VmPeak: 2576 kB VmSize: 2576 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 928 kB VmRSS: 928 kB RssAnon: 88 kB RssFile: 840 kB RssShmem: 0 kB VmData: 232 kB VmStk: 132 kB VmExe: 76 kB VmLib: 1520 kB VmPTE: 44 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 4/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000010002 CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 61 nonvoluntary_ctxt_switches: 8 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "sh", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3111937", "Ngid" => "0", "Pid" => "3111937", "PPid" => "3111878", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "3111937", "NSpid" => "3111937", "NSpgid" => "3111937", "NSsid" => "3111937", "VmPeak" => "2576 kB", "VmSize" => "2576 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "928 kB", "VmRSS" => "928 kB", "RssAnon" => "88 kB", "RssFile" => "840 kB", "RssShmem" => "0 kB", "VmData" => "232 kB", "VmStk" => "132 kB", "VmExe" => "76 kB", "VmLib" => "1520 kB", "VmPTE" => "44 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "4/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000010002", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "61", "nonvoluntary_ctxt_switches" => "8"} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: sleep Umask: 0022 State: S (sleeping) Tgid: 3111957 Ngid: 0 Pid: 3111957 PPid: 3111937 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 3111957 NSpid: 3111957 NSpgid: 3111937 NSsid: 3111937 VmPeak: 2484 kB VmSize: 2484 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 904 kB VmRSS: 904 kB RssAnon: 88 kB RssFile: 816 kB RssShmem: 0 kB VmData: 224 kB VmStk: 132 kB VmExe: 20 kB VmLib: 1520 kB VmPTE: 40 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000000000 CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 4 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "sleep", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3111957", "Ngid" => "0", "Pid" => "3111957", "PPid" => "3111937", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "3111957", "NSpid" => "3111957", "NSpgid" => "3111937", "NSsid" => "3111937", "VmPeak" => "2484 kB", "VmSize" => "2484 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "904 kB", "VmRSS" => "904 kB", "RssAnon" => "88 kB", "RssFile" => "816 kB", "RssShmem" => "0 kB", "VmData" => "224 kB", "VmStk" => "132 kB", "VmExe" => "20 kB", "VmLib" => "1520 kB", "VmPTE" => "40 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000000000", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "4", "nonvoluntary_ctxt_switches" => "0"} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 3112901 Ngid: 0 Pid: 3112901 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 3112901 NSpid: 3112901 NSpgid: 3112901 NSsid: 178 VmPeak: 1238312 kB VmSize: 1238312 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 14684 kB VmRSS: 14676 kB RssAnon: 3824 kB RssFile: 10852 kB RssShmem: 0 kB VmData: 45324 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 116 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 11 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 9 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3112901", "Ngid" => "0", "Pid" => "3112901", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "", "NStgid" => "3112901", "NSpid" => "3112901", "NSpgid" => "3112901", "NSsid" => "178", "VmPeak" => "1238312 kB", "VmSize" => "1238312 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "14684 kB", "VmRSS" => "14676 kB", "RssAnon" => "3824 kB", "RssFile" => "10852 kB", "RssShmem" => "0 kB", "VmData" => "45324 kB", "VmStk" => "132 kB", "VmExe" => "5628 kB", "VmLib" => "8 kB", "VmPTE" => "116 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "11", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "9", "nonvoluntary_ctxt_switches" => "0"} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 3112926 Ngid: 0 Pid: 3112926 PPid: 3112901 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 3112926 1 NSpid: 3112926 1 NSpgid: 3112926 1 NSsid: 3112926 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 29 nonvoluntary_ctxt_switches: 9 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3112926", "Ngid" => "0", "Pid" => "3112926", "PPid" => "3112901", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "3112926\t1", "NSpid" => "3112926\t1", "NSpgid" => "3112926\t1", "NSsid" => "3112926\t1", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "28 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "2", "Seccomp_filters" => "1", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "29", "nonvoluntary_ctxt_switches" => "9"} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: chaos-operator Umask: 0022 State: S (sleeping) Tgid: 3112959 Ngid: 0 Pid: 3112959 PPid: 3112901 TracerPid: 0 Uid: 1000 1000 1000 1000 Gid: 1000 1000 1000 1000 FDSize: 64 Groups: 1000 NStgid: 3112959 1 NSpid: 3112959 1 NSpgid: 3112959 1 NSsid: 3112959 1 VmPeak: 1262700 kB VmSize: 1262700 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 38888 kB VmRSS: 38888 kB RssAnon: 15496 kB RssFile: 23392 kB RssShmem: 0 kB VmData: 63428 kB VmStk: 132 kB VmExe: 15232 kB VmLib: 8 kB VmPTE: 200 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 35 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 1215 nonvoluntary_ctxt_switches: 10 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "chaos-operator", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3112959", "Ngid" => "0", "Pid" => "3112959", "PPid" => "3112901", "TracerPid" => "0", "Uid" => "1000\t1000\t1000\t1000", "Gid" => "1000\t1000\t1000\t1000", "FDSize" => "64", "Groups" => "1000", "NStgid" => "3112959\t1", "NSpid" => "3112959\t1", "NSpgid" => "3112959\t1", "NSsid" => "3112959\t1", "VmPeak" => "1262700 kB", "VmSize" => "1262700 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "38888 kB", "VmRSS" => "38888 kB", "RssAnon" => "15496 kB", "RssFile" => "23392 kB", "RssShmem" => "0 kB", "VmData" => "63428 kB", "VmStk" => "132 kB", "VmExe" => "15232 kB", "VmLib" => "8 kB", "VmPTE" => "200 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "35", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "1215", "nonvoluntary_ctxt_switches" => "10"} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 3113360 Ngid: 0 Pid: 3113360 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 3113360 NSpid: 3113360 NSpgid: 3113360 NSsid: 178 VmPeak: 1238312 kB VmSize: 1238312 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 13976 kB VmRSS: 13920 kB RssAnon: 3488 kB RssFile: 10432 kB RssShmem: 0 kB VmData: 41228 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 112 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 11 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 8 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3113360", "Ngid" => "0", "Pid" => "3113360", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "", "NStgid" => "3113360", "NSpid" => "3113360", "NSpgid" => "3113360", "NSsid" => "178", "VmPeak" => "1238312 kB", "VmSize" => "1238312 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "13976 kB", "VmRSS" => "13920 kB", "RssAnon" => "3488 kB", "RssFile" => "10432 kB", "RssShmem" => "0 kB", "VmData" => "41228 kB", "VmStk" => "132 kB", "VmExe" => "5628 kB", "VmLib" => "8 kB", "VmPTE" => "112 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "11", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "8", "nonvoluntary_ctxt_switches" => "0"} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 3113384 Ngid: 0 Pid: 3113384 PPid: 3113360 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 3113384 1 NSpid: 3113384 1 NSpgid: 3113384 1 NSsid: 3113384 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 24 nonvoluntary_ctxt_switches: 13 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3113384", "Ngid" => "0", "Pid" => "3113384", "PPid" => "3113360", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "3113384\t1", "NSpid" => "3113384\t1", "NSpgid" => "3113384\t1", "NSsid" => "3113384\t1", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "28 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "2", "Seccomp_filters" => "1", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "24", "nonvoluntary_ctxt_switches" => "13"} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: coredns Umask: 0022 State: S (sleeping) Tgid: 3113417 Ngid: 0 Pid: 3113417 PPid: 3113360 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 3113417 1 NSpid: 3113417 1 NSpgid: 3113417 1 NSsid: 3113417 1 VmPeak: 748492 kB VmSize: 748492 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 41412 kB VmRSS: 41412 kB RssAnon: 12648 kB RssFile: 28764 kB RssShmem: 0 kB VmData: 108680 kB VmStk: 132 kB VmExe: 22032 kB VmLib: 8 kB VmPTE: 200 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 22 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffe7fc1feff CapInh: 0000000000000000 CapPrm: 00000000a80425fb CapEff: 00000000a80425fb CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 712 nonvoluntary_ctxt_switches: 15 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "coredns", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3113417", "Ngid" => "0", "Pid" => "3113417", "PPid" => "3113360", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "3113417\t1", "NSpid" => "3113417\t1", "NSpgid" => "3113417\t1", "NSsid" => "3113417\t1", "VmPeak" => "748492 kB", "VmSize" => "748492 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "41412 kB", "VmRSS" => "41412 kB", "RssAnon" => "12648 kB", "RssFile" => "28764 kB", "RssShmem" => "0 kB", "VmData" => "108680 kB", "VmStk" => "132 kB", "VmExe" => "22032 kB", "VmLib" => "8 kB", "VmPTE" => "200 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "22", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffe7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "00000000a80425fb", "CapEff" => "00000000a80425fb", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "712", "nonvoluntary_ctxt_switches" => "15"} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: cmdline_by_pid I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3113417/cmdline I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3113417/cmdline ✔️ 🏆PASSED: [zombie_handled] Zombie handled ⚖👀 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: /coredns-conf/etc/coredns/Corefile D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000", error: ""} I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: cmdline_by_node cmdline: {status: Process::Status[0], output: "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000", error: ""} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: current_pid == potential_parent_pid D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 372 Ngid: 0 Pid: 372 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 372 NSpid: 372 NSpgid: 372 NSsid: 178 VmPeak: 1238312 kB VmSize: 1238312 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 14124 kB VmRSS: 12904 kB RssAnon: 2612 kB RssFile: 10292 kB RssShmem: 0 kB VmData: 41228 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 116 kB VmSwap: 612 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 13 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 9 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "372", "Ngid" => "0", "Pid" => "372", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "", "NStgid" => "372", "NSpid" => "372", "NSpgid" => "372", "NSsid" => "178", "VmPeak" => "1238312 kB", "VmSize" => "1238312 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "14124 kB", "VmRSS" => "12904 kB", "RssAnon" => "2612 kB", "RssFile" => "10292 kB", "RssShmem" => "0 kB", "VmData" => "41228 kB", "VmStk" => "132 kB", "VmExe" => "5628 kB", "VmLib" => "8 kB", "VmPTE" => "116 kB", "VmSwap" => "612 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "13", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "9", "nonvoluntary_ctxt_switches" => "0"} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 384 Ngid: 0 Pid: 384 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 384 NSpid: 384 NSpgid: 384 NSsid: 178 VmPeak: 1238312 kB VmSize: 1238312 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 14288 kB VmRSS: 13628 kB RssAnon: 3176 kB RssFile: 10452 kB RssShmem: 0 kB VmData: 45324 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 120 kB VmSwap: 504 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 13 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 8 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "384", "Ngid" => "0", "Pid" => "384", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "", "NStgid" => "384", "NSpid" => "384", "NSpgid" => "384", "NSsid" => "178", "VmPeak" => "1238312 kB", "VmSize" => "1238312 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "14288 kB", "VmRSS" => "13628 kB", "RssAnon" => "3176 kB", "RssFile" => "10452 kB", "RssShmem" => "0 kB", "VmData" => "45324 kB", "VmStk" => "132 kB", "VmExe" => "5628 kB", "VmLib" => "8 kB", "VmPTE" => "120 kB", "VmSwap" => "504 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "13", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "8", "nonvoluntary_ctxt_switches" => "0"} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 423 Ngid: 0 Pid: 423 PPid: 372 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 423 1 NSpid: 423 1 NSpgid: 423 1 NSsid: 423 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 34 nonvoluntary_ctxt_switches: 8 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "423", "Ngid" => "0", "Pid" => "423", "PPid" => "372", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "423\t1", "NSpid" => "423\t1", "NSpgid" => "423\t1", "NSsid" => "423\t1", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "28 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "34", "nonvoluntary_ctxt_switches" => "8"} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 430 Ngid: 0 Pid: 430 PPid: 384 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 430 1 NSpid: 430 1 NSpgid: 430 1 NSsid: 430 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 24 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 35 nonvoluntary_ctxt_switches: 11 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "430", "Ngid" => "0", "Pid" => "430", "PPid" => "384", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "430\t1", "NSpid" => "430\t1", "NSpgid" => "430\t1", "NSsid" => "430\t1", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "24 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "2", "Seccomp_filters" => "1", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "35", "nonvoluntary_ctxt_switches" => "11"} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: kube-proxy Umask: 0022 State: S (sleeping) Tgid: 479 Ngid: 331610 Pid: 479 PPid: 372 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 479 1 NSpid: 479 1 NSpgid: 479 1 NSsid: 479 1 VmPeak: 1299688 kB VmSize: 1299688 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 56656 kB VmRSS: 34240 kB RssAnon: 18436 kB RssFile: 15804 kB RssShmem: 0 kB VmData: 78976 kB VmStk: 132 kB VmExe: 30348 kB VmLib: 8 kB VmPTE: 288 kB VmSwap: 472 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 38 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 96966 nonvoluntary_ctxt_switches: 133 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "kube-proxy", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "479", "Ngid" => "331610", "Pid" => "479", "PPid" => "372", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "479\t1", "NSpid" => "479\t1", "NSpgid" => "479\t1", "NSsid" => "479\t1", "VmPeak" => "1299688 kB", "VmSize" => "1299688 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "56656 kB", "VmRSS" => "34240 kB", "RssAnon" => "18436 kB", "RssFile" => "15804 kB", "RssShmem" => "0 kB", "VmData" => "78976 kB", "VmStk" => "132 kB", "VmExe" => "30348 kB", "VmLib" => "8 kB", "VmPTE" => "288 kB", "VmSwap" => "472 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "38", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "96966", "nonvoluntary_ctxt_switches" => "133"} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: kindnetd Umask: 0022 State: S (sleeping) Tgid: 680 Ngid: 117220 Pid: 680 PPid: 384 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 680 1 NSpid: 680 1 NSpgid: 680 1 NSsid: 680 1 VmPeak: 1276212 kB VmSize: 1276212 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 40068 kB VmRSS: 24024 kB RssAnon: 13400 kB RssFile: 10624 kB RssShmem: 0 kB VmData: 67572 kB VmStk: 132 kB VmExe: 21148 kB VmLib: 8 kB VmPTE: 248 kB VmSwap: 232 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 41 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba3a00 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 00000000a80435fb CapEff: 00000000a80435fb CapBnd: 00000000a80435fb CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 1091 nonvoluntary_ctxt_switches: 18 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "kindnetd", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "680", "Ngid" => "117220", "Pid" => "680", "PPid" => "384", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "680\t1", "NSpid" => "680\t1", "NSpgid" => "680\t1", "NSsid" => "680\t1", "VmPeak" => "1276212 kB", "VmSize" => "1276212 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "40068 kB", "VmRSS" => "24024 kB", "RssAnon" => "13400 kB", "RssFile" => "10624 kB", "RssShmem" => "0 kB", "VmData" => "67572 kB", "VmStk" => "132 kB", "VmExe" => "21148 kB", "VmLib" => "8 kB", "VmPTE" => "248 kB", "VmSwap" => "232 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "41", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba3a00", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "00000000a80435fb", "CapEff" => "00000000a80435fb", "CapBnd" => "00000000a80435fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "1091", "nonvoluntary_ctxt_switches" => "18"} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 793 Ngid: 0 Pid: 793 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 793 NSpid: 793 NSpgid: 793 NSsid: 178 VmPeak: 1238312 kB VmSize: 1238312 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 15024 kB VmRSS: 14408 kB RssAnon: 3488 kB RssFile: 10920 kB RssShmem: 0 kB VmData: 45324 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 124 kB VmSwap: 88 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 13 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 9 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "793", "Ngid" => "0", "Pid" => "793", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "", "NStgid" => "793", "NSpid" => "793", "NSpgid" => "793", "NSsid" => "178", "VmPeak" => "1238312 kB", "VmSize" => "1238312 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "15024 kB", "VmRSS" => "14408 kB", "RssAnon" => "3488 kB", "RssFile" => "10920 kB", "RssShmem" => "0 kB", "VmData" => "45324 kB", "VmStk" => "132 kB", "VmExe" => "5628 kB", "VmLib" => "8 kB", "VmPTE" => "124 kB", "VmSwap" => "88 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "13", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "9", "nonvoluntary_ctxt_switches" => "0"} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 818 Ngid: 0 Pid: 818 PPid: 793 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 818 1 NSpid: 818 1 NSpgid: 818 1 NSsid: 818 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 24 nonvoluntary_ctxt_switches: 7 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "818", "Ngid" => "0", "Pid" => "818", "PPid" => "793", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "818\t1", "NSpid" => "818\t1", "NSpgid" => "818\t1", "NSsid" => "818\t1", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "28 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "24", "nonvoluntary_ctxt_switches" => "7"} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: sh Umask: 0022 State: S (sleeping) Tgid: 854 Ngid: 0 Pid: 854 PPid: 793 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 1 2 3 4 6 10 11 20 26 27 NStgid: 854 1 NSpid: 854 1 NSpgid: 854 1 NSsid: 854 1 VmPeak: 3552 kB VmSize: 1564 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 972 kB VmRSS: 84 kB RssAnon: 80 kB RssFile: 4 kB RssShmem: 0 kB VmData: 52 kB VmStk: 132 kB VmExe: 788 kB VmLib: 556 kB VmPTE: 44 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000004 SigCgt: 0000000000010002 CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 906 nonvoluntary_ctxt_switches: 9 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "sh", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "854", "Ngid" => "0", "Pid" => "854", "PPid" => "793", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0 1 2 3 4 6 10 11 20 26 27", "NStgid" => "854\t1", "NSpid" => "854\t1", "NSpgid" => "854\t1", "NSsid" => "854\t1", "VmPeak" => "3552 kB", "VmSize" => "1564 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "972 kB", "VmRSS" => "84 kB", "RssAnon" => "80 kB", "RssFile" => "4 kB", "RssShmem" => "0 kB", "VmData" => "52 kB", "VmStk" => "132 kB", "VmExe" => "788 kB", "VmLib" => "556 kB", "VmPTE" => "44 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000004", "SigCgt" => "0000000000010002", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "906", "nonvoluntary_ctxt_switches" => "9"} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: proctree: [{"Name" => "coredns", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3113417", "Ngid" => "0", "Pid" => "3113417", "PPid" => "3113360", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "3113417\t1", "NSpid" => "3113417\t1", "NSpgid" => "3113417\t1", "NSsid" => "3113417\t1", "VmPeak" => "748492 kB", "VmSize" => "748492 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "41412 kB", "VmRSS" => "41412 kB", "RssAnon" => "12648 kB", "RssFile" => "28764 kB", "RssShmem" => "0 kB", "VmData" => "108680 kB", "VmStk" => "132 kB", "VmExe" => "22032 kB", "VmLib" => "8 kB", "VmPTE" => "200 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "22", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffe7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "00000000a80425fb", "CapEff" => "00000000a80425fb", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "712", "nonvoluntary_ctxt_switches" => "15", "cmdline" => "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000"}] D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-zombie_handled: status: {"Name" => "coredns", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3113417", "Ngid" => "0", "Pid" => "3113417", "PPid" => "3113360", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "3113417\t1", "NSpid" => "3113417\t1", "NSpgid" => "3113417\t1", "NSsid" => "3113417\t1", "VmPeak" => "748492 kB", "VmSize" => "748492 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "41412 kB", "VmRSS" => "41412 kB", "RssAnon" => "12648 kB", "RssFile" => "28764 kB", "RssShmem" => "0 kB", "VmData" => "108680 kB", "VmStk" => "132 kB", "VmExe" => "22032 kB", "VmLib" => "8 kB", "VmPTE" => "200 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "22", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffe7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "00000000a80425fb", "CapEff" => "00000000a80425fb", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "712", "nonvoluntary_ctxt_switches" => "15", "cmdline" => "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000"} I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite-zombie_handled: status cmdline: /coredns-conf/etc/coredns/Corefile I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite-zombie_handled: pid: 3113417 I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite-zombie_handled: status name: coredns I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite-zombie_handled: state: S (sleeping) I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite-zombie_handled: (state =~ /zombie/): I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite-zombie_handled: zombies.all?(nil): true I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: container_status_result.all?(true): true I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: pod_resp.all?(true): true D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: yield resp: true I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite-KubectlClient::Get.resource_volumes: Service resource_name: coredns-coredns namespace: cnf-default D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: workload resource test intialized: true test_passed: true D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: task zombie_handled emoji: ⚖👀 I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "zombie_handled", "emoji" => "⚖👀", "tags" => ["microservice", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["microservice", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: resp: ["microservice", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: task_type x: microservice acc: I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: task_points: task: zombie_handled is worth: 100 points I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: cmd: /usr/local/bin/cnf-testsuite cert I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite-zombie_handled: task_runtime=00:00:47.995823859; start_time=2025-03-06 11:57:00 UTC; end_time:2025-03-06 11:57:48 UTC I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "zombie_handled", "emoji" => "⚖👀", "tags" => ["microservice", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["microservice", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: resp: ["microservice", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: task_type x: microservice acc: I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: upsert_task: task: zombie_handled has status: passed and is awarded: 100 points. Runtime: 00:00:47.995823859 I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: task_runner args: # I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: ensure_cnf_installed? true I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: check_cnf_config args: # I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: check_cnf_config cnf: I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [sig_term_handled] I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: CNF configs found: 1 D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: single_task_runner args: # "installed_cnf_files/cnf-testsuite.yml"}> I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite-sig_term_handled: Starting test D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite-sig_term_handled: cnf_config: # I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: cnf_resource_ymls I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: manifest_path_to_ymls file_path: installed_cnf_files/common_manifest.yml I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: manifest_string_to_ymls D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: manifest_string_to_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: cnf_resource_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Deployment D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Service D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: {} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Pod D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ReplicaSet D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: StatefulSet D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: DaemonSet D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ServiceAccount D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: resources: [] D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: all resource: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}} D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite-KubectlClient::Get.resource_volumes: Deployment resource_name: coredns-coredns namespace: cnf-default I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "litmuschaos.io/chaos": "true", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 4, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4961737", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "availableReplicas": 1, "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 4, "readyReplicas": 1, "replicas": 1, "updatedReplicas": 1 } } I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: kubectl get resource volumes: [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}] D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: kubectl get resource containers kind: Deployment resource_name: coredns-coredns namespace: cnf-default I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "litmuschaos.io/chaos": "true", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 4, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4961737", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "availableReplicas": 1, "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 4, "readyReplicas": 1, "replicas": 1, "updatedReplicas": 1 } } D, [2025-03-06 11:57:48 UTC #1422] DEBUG -- cnf-testsuite: kubectl get resource containers: [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}]}] I, [2025-03-06 11:57:48 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default D, [2025-03-06 11:57:49 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "litmuschaos.io/chaos": "true", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 4, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4961737", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "availableReplicas": 1, "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 4, "readyReplicas": 1, "replicas": 1, "updatedReplicas": 1 } } I, [2025-03-06 11:57:49 UTC #1422] INFO -- cnf-testsuite: pods_by_resource D, [2025-03-06 11:57:49 UTC #1422] DEBUG -- cnf-testsuite: pods_by_resource resource: {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"annotations" => {"deployment.kubernetes.io/revision" => "1", "litmuschaos.io/chaos" => "true", "meta.helm.sh/release-name" => "coredns", "meta.helm.sh/release-namespace" => "cnf-default"}, "creationTimestamp" => "2025-03-06T11:52:37Z", "generation" => 4, "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/name" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS"}, "name" => "coredns-coredns", "namespace" => "cnf-default", "resourceVersion" => "4961737", "uid" => "489e7e00-25be-4697-9d6f-9e9bc6689c66"}, "spec" => {"progressDeadlineSeconds" => 600, "replicas" => 1, "revisionHistoryLimit" => 10, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"}}, "strategy" => {"rollingUpdate" => {"maxSurge" => "25%", "maxUnavailable" => 1}, "type" => "RollingUpdate"}, "template" => {"metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => nil, "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"}}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}]}], "dnsPolicy" => "Default", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}]}}}, "status" => {"availableReplicas" => 1, "conditions" => [{"lastTransitionTime" => "2025-03-06T11:52:37Z", "lastUpdateTime" => "2025-03-06T11:52:52Z", "message" => "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason" => "NewReplicaSetAvailable", "status" => "True", "type" => "Progressing"}, {"lastTransitionTime" => "2025-03-06T11:53:07Z", "lastUpdateTime" => "2025-03-06T11:53:07Z", "message" => "Deployment has minimum availability.", "reason" => "MinimumReplicasAvailable", "status" => "True", "type" => "Available"}], "observedGeneration" => 4, "readyReplicas" => 1, "replicas" => 1, "updatedReplicas" => 1}} I, [2025-03-06 11:57:49 UTC #1422] INFO -- cnf-testsuite: resource kind: Deployment I, [2025-03-06 11:57:49 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:49 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:49 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:49 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:49 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:49 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:49 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:49 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:49 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:49 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:49 UTC #1422] DEBUG -- cnf-testsuite: taints: [{"effect" => "NoSchedule", "key" => "node-role.kubernetes.io/control-plane"}] I, [2025-03-06 11:57:49 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:49 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:49 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:49 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:49 UTC #1422] DEBUG -- cnf-testsuite: taints: I, [2025-03-06 11:57:49 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:49 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:49 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:50 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:50 UTC #1422] DEBUG -- cnf-testsuite: taints: D, [2025-03-06 11:57:50 UTC #1422] DEBUG -- cnf-testsuite: resource_map items : [{"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker"}, "name" => "v132-worker", "resourceVersion" => "4962054", "uid" => "f5b473ab-dbca-4331-a088-561021e2400f"}, "spec" => {"podCIDR" => "10.244.2.0/24", "podCIDRs" => ["10.244.2.0/24"], "providerID" => "kind://docker/v132/v132-worker"}, "status" => {"addresses" => [{"address" => "172.24.0.9", "type" => "InternalIP"}, {"address" => "v132-worker", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter"], "sizeBytes" => 351519591}, {"names" => ["docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter"], "sizeBytes" => 344304298}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter"], "sizeBytes" => 298627136}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter"], "sizeBytes" => 285504787}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0"], "sizeBytes" => 58057865}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6"], "sizeBytes" => 11555354}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "71e7b586a0c24b35898016e092b898c4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "09103c12-a066-4570-92b0-221c8c39ecb8"}}}, {"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4961618", "uid" => "a499c571-be9e-41e0-a4ea-dc082e96fd5a"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest"], "sizeBytes" => 72080558}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "960341c8-b3a9-4b4a-bb0c-142338daaac6"}}}] D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: nodes: [{"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker"}, "name" => "v132-worker", "resourceVersion" => "4962054", "uid" => "f5b473ab-dbca-4331-a088-561021e2400f"}, "spec" => {"podCIDR" => "10.244.2.0/24", "podCIDRs" => ["10.244.2.0/24"], "providerID" => "kind://docker/v132/v132-worker"}, "status" => {"addresses" => [{"address" => "172.24.0.9", "type" => "InternalIP"}, {"address" => "v132-worker", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter"], "sizeBytes" => 351519591}, {"names" => ["docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter"], "sizeBytes" => 344304298}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter"], "sizeBytes" => 298627136}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter"], "sizeBytes" => 285504787}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0"], "sizeBytes" => 58057865}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6"], "sizeBytes" => 11555354}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "71e7b586a0c24b35898016e092b898c4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "09103c12-a066-4570-92b0-221c8c39ecb8"}}}, {"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4961618", "uid" => "a499c571-be9e-41e0-a4ea-dc082e96fd5a"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest"], "sizeBytes" => 72080558}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "960341c8-b3a9-4b4a-bb0c-142338daaac6"}}}] D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker"} D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker I, [2025-03-06 11:57:51 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-mh426", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961311", "uid" => "95aa40ad-9e0e-486b-a5d0-41f9194fd651"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-9vvm7", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-9vvm7", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:35Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:35Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:35Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-9vvm7", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.9", "hostIPs" => [{"ip" => "172.24.0.9"}], "phase" => "Running", "podIP" => "172.24.0.9", "podIPs" => [{"ip" => "172.24.0.9"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-mh426 D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-5d7tp", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "604", "uid" => "740809cc-4bf8-40e5-a556-d39f5cf1ff03"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-wpwg9", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-wpwg9", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:41Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:41Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:41Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:40Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-wpwg9", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.9", "hostIPs" => [{"ip" => "172.24.0.9"}], "phase" => "Running", "podIP" => "10.244.2.2", "podIPs" => [{"ip" => "10.244.2.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-5d7tp D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-4s8ph", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "509", "uid" => "0f87ae31-f6df-43d6-b42a-0236e849318a"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-5p2rs", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-5p2rs", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:20Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:26Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-5p2rs", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.9", "hostIPs" => [{"ip" => "172.24.0.9"}], "phase" => "Running", "podIP" => "172.24.0.9", "podIPs" => [{"ip" => "172.24.0.9"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:20Z"}} D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-4s8ph D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-dkr2j", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "500", "uid" => "14b0603b-2896-496e-84e3-572ff7452828"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-sq7d2", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-sq7d2", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:25Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:20Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:25Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:25Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:24Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-sq7d2", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.9", "hostIPs" => [{"ip" => "172.24.0.9"}], "phase" => "Running", "podIP" => "172.24.0.9", "podIPs" => [{"ip" => "172.24.0.9"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:20Z"}} D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-dkr2j D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:51 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 I, [2025-03-06 11:57:51 UTC #1422] INFO -- cnf-testsuite: resource kind: Deployment I, [2025-03-06 11:57:51 UTC #1422] INFO -- cnf-testsuite: pods_by_resource name: coredns-coredns D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: resource_labels kind: Deployment resource_name: coredns-coredns I, [2025-03-06 11:57:51 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "litmuschaos.io/chaos": "true", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 4, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4961737", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "availableReplicas": 1, "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 4, "readyReplicas": 1, "replicas": 1, "updatedReplicas": 1 } } D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: resource_labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} I, [2025-03-06 11:57:51 UTC #1422] INFO -- cnf-testsuite: pods_by_resource labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label labels: {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns"} D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns D, [2025-03-06 11:57:51 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match coredns I, [2025-03-06 11:57:51 UTC #1422] INFO -- cnf-testsuite: pod_name: coredns-coredns-64fc886fd4-clwtn I, [2025-03-06 11:57:51 UTC #1422] INFO -- cnf-testsuite: wait_for_resource_availability kind, name: pod coredns-coredns-64fc886fd4-clwtn I, [2025-03-06 11:57:54 UTC #1422] INFO -- cnf-testsuite: resource_desired_is_available? command: kubectl get pod coredns-coredns-64fc886fd4-clwtn -o=yaml -n cnf-default D, [2025-03-06 11:57:54 UTC #1422] DEBUG -- cnf-testsuite: resource_desired_is_available? output: apiVersion: v1 kind: Pod metadata: annotations: checksum/config: 473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9 scheduler.alpha.kubernetes.io/critical-pod: "" scheduler.alpha.kubernetes.io/tolerations: '[{"key":"CriticalAddonsOnly", "operator":"Exists"}]' creationTimestamp: "2025-03-06T11:53:44Z" generateName: coredns-coredns-64fc886fd4- labels: app.kubernetes.io/instance: coredns app.kubernetes.io/name: coredns k8s-app: coredns pod-template-hash: 64fc886fd4 name: coredns-coredns-64fc886fd4-clwtn namespace: cnf-default ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: coredns-coredns-64fc886fd4 uid: 089c856e-30f5-4de8-8846-ea764921a48a resourceVersion: "4961733" uid: 1493bcca-c392-4f42-8125-d050b7590390 spec: containers: - args: - -conf - /etc/coredns/Corefile image: coredns/coredns:1.7.1 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 5 httpGet: path: /health port: 8080 scheme: HTTP initialDelaySeconds: 60 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 5 name: coredns ports: - containerPort: 53 name: udp-53 protocol: UDP - containerPort: 53 name: tcp-53 protocol: TCP readinessProbe: failureThreshold: 5 httpGet: path: /ready port: 8181 scheme: HTTP initialDelaySeconds: 10 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 5 resources: limits: cpu: 100m memory: 128Mi requests: cpu: 100m memory: 128Mi terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /etc/coredns name: config-volume - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-fkffz readOnly: true dnsPolicy: Default enableServiceLinks: true nodeName: v132-worker2 preemptionPolicy: PreemptLowerPriority priority: 0 restartPolicy: Always schedulerName: default-scheduler securityContext: {} serviceAccount: default serviceAccountName: default terminationGracePeriodSeconds: 30 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 300 - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 300 volumes: - configMap: defaultMode: 420 items: - key: Corefile path: Corefile name: coredns-coredns name: config-volume - name: kube-api-access-fkffz projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace status: conditions: - lastProbeTime: null lastTransitionTime: "2025-03-06T11:53:48Z" status: "True" type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: "2025-03-06T11:53:45Z" status: "True" type: Initialized - lastProbeTime: null lastTransitionTime: "2025-03-06T11:53:59Z" status: "True" type: Ready - lastProbeTime: null lastTransitionTime: "2025-03-06T11:53:59Z" status: "True" type: ContainersReady - lastProbeTime: null lastTransitionTime: "2025-03-06T11:53:45Z" status: "True" type: PodScheduled containerStatuses: - containerID: containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782 image: docker.io/coredns/coredns:1.7.1 imageID: docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef lastState: {} name: coredns ready: true restartCount: 0 started: true state: running: startedAt: "2025-03-06T11:53:47Z" volumeMounts: - mountPath: /etc/coredns name: config-volume - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-fkffz readOnly: true recursiveReadOnly: Disabled hostIP: 172.24.0.8 hostIPs: - ip: 172.24.0.8 phase: Running podIP: 10.244.1.177 podIPs: - ip: 10.244.1.177 qosClass: Guaranteed startTime: "2025-03-06T11:53:45Z" I, [2025-03-06 11:57:54 UTC #1422] INFO -- cnf-testsuite-sig_term_handled: container_statuses: [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}] I, [2025-03-06 11:57:54 UTC #1422] INFO -- cnf-testsuite-sig_term_handled: pod_name: coredns-coredns-64fc886fd4-clwtn I, [2025-03-06 11:57:54 UTC #1422] INFO -- cnf-testsuite: nodes_by_pod pod name: coredns-coredns-64fc886fd4-clwtn I, [2025-03-06 11:57:54 UTC #1422] INFO -- cnf-testsuite: resource_select I, [2025-03-06 11:57:54 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:54 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:54 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:55 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:55 UTC #1422] INFO -- cnf-testsuite: nodes size: 3 I, [2025-03-06 11:57:55 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:55 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:55 UTC #1422] INFO -- cnf-testsuite: nodes : {"apiVersion" => "v1", "items" => [{"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:05Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-control-plane", "kubernetes.io/os" => "linux", "node-role.kubernetes.io/control-plane" => "", "node.kubernetes.io/exclude-from-external-load-balancers" => ""}, "name" => "v132-control-plane", "resourceVersion" => "4961381", "uid" => "e3a8ca14-2d88-4785-a327-522fe918366a"}, "spec" => {"podCIDR" => "10.244.0.0/24", "podCIDRs" => ["10.244.0.0/24"], "providerID" => "kind://docker/v132/v132-control-plane", "taints" => [{"effect" => "NoSchedule", "key" => "node-role.kubernetes.io/control-plane"}]}, "status" => {"addresses" => [{"address" => "172.24.0.10", "type" => "InternalIP"}, {"address" => "v132-control-plane", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:52:51Z", "lastTransitionTime" => "2025-01-31T08:09:03Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:52:51Z", "lastTransitionTime" => "2025-01-31T08:09:03Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:52:51Z", "lastTransitionTime" => "2025-01-31T08:09:03Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:52:51Z", "lastTransitionTime" => "2025-01-31T08:09:29Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0"], "sizeBytes" => 58057865}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6"], "sizeBytes" => 2021226}, {"names" => ["registry.k8s.io/pause:3.10"], "sizeBytes" => 320368}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "c94df63d-d52d-4f3e-a918-e56af4ca2553"}}}, {"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker"}, "name" => "v132-worker", "resourceVersion" => "4962054", "uid" => "f5b473ab-dbca-4331-a088-561021e2400f"}, "spec" => {"podCIDR" => "10.244.2.0/24", "podCIDRs" => ["10.244.2.0/24"], "providerID" => "kind://docker/v132/v132-worker"}, "status" => {"addresses" => [{"address" => "172.24.0.9", "type" => "InternalIP"}, {"address" => "v132-worker", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:55:14Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter"], "sizeBytes" => 351519591}, {"names" => ["docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter"], "sizeBytes" => 344304298}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter"], "sizeBytes" => 298627136}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter"], "sizeBytes" => 285504787}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0"], "sizeBytes" => 58057865}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6"], "sizeBytes" => 11555354}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "71e7b586a0c24b35898016e092b898c4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "09103c12-a066-4570-92b0-221c8c39ecb8"}}}, {"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4961618", "uid" => "a499c571-be9e-41e0-a4ea-dc082e96fd5a"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest"], "sizeBytes" => 72080558}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "960341c8-b3a9-4b4a-bb0c-142338daaac6"}}}], "kind" => "List", "metadata" => {"resourceVersion" => ""}} I, [2025-03-06 11:57:55 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:55 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:55 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:55 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:55 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:55 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:55 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:55 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:55 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:55 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:55 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:55 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } I, [2025-03-06 11:57:55 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.nodes command: kubectl get nodes -o json D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.nodes output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:05Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-control-plane", "kubernetes.io/os": "linux", "node-role.kubernetes.io/control-plane": "", "node.kubernetes.io/exclude-from-external-load-balancers": "" }, "name": "v132-control-plane", "resourceVersion": "4961381", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" }, "spec": { "podCIDR": "10.244.0.0/24", "podCIDRs": [ "10.244.0.0/24" ], "providerID": "kind://docker/v132/v132-control-plane", "taints": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" } ] }, "status": { "addresses": [ { "address": "172.24.0.10", "type": "InternalIP" }, { "address": "v132-control-plane", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:03Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:52:51Z", "lastTransitionTime": "2025-01-31T08:09:29Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "docker.io/library/alpine:3.6" ], "sizeBytes": 2021226 }, { "names": [ "registry.k8s.io/pause:3.10" ], "sizeBytes": 320368 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "ea0bb89d134746f7a7d5e52c74258657", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "c94df63d-d52d-4f3e-a918-e56af4ca2553" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker" }, "name": "v132-worker", "resourceVersion": "4962054", "uid": "f5b473ab-dbca-4331-a088-561021e2400f" }, "spec": { "podCIDR": "10.244.2.0/24", "podCIDRs": [ "10.244.2.0/24" ], "providerID": "kind://docker/v132/v132-worker" }, "status": { "addresses": [ { "address": "172.24.0.9", "type": "InternalIP" }, { "address": "v132-worker", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:55:14Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-ellis@sha256:abcaf4a9ec74aa746f3b3949f05ee359349fce2b0b3b2deedf67164719cff5dc", "docker.io/ollivier/clearwater-ellis:hunter" ], "sizeBytes": 351519591 }, { "names": [ "docker.io/ollivier/clearwater-homer@sha256:f8738d756137990120f6aafca7e0bc57186ab591a4b51508ba9ddf30688f4de1", "docker.io/ollivier/clearwater-homer:hunter" ], "sizeBytes": 344304298 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-sprout@sha256:fd91f90bdfbfac30288ca296962e36537f8fa311d34711904e027098227d9f49", "docker.io/ollivier/clearwater-sprout:hunter" ], "sizeBytes": 298627136 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-chronos@sha256:1d5f9b5385db632e3076463fec5a4db5d4a15ef21ac5a112cb42fb0551ffa36d", "docker.io/ollivier/clearwater-chronos:hunter" ], "sizeBytes": 285504787 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "docker.io/aquasec/kube-bench@sha256:56599d5dfc5066e87ca8b791d303a658dc735e9ff0043eaae38f30efdb1d9e41", "docker.io/aquasec/kube-bench:v0.10.0" ], "sizeBytes": 58057865 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "registry.k8s.io/build-image/distroless-iptables@sha256:be1e8d4d451ada7e39ba4e44fbd8f58ba50feb4f4b1906df7b2bbb424efb06f3", "registry.k8s.io/build-image/distroless-iptables:v0.6.6" ], "sizeBytes": 11555354 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "71e7b586a0c24b35898016e092b898c4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "09103c12-a066-4570-92b0-221c8c39ecb8" } } }, { "apiVersion": "v1", "kind": "Node", "metadata": { "annotations": { "kubeadm.alpha.kubernetes.io/cri-socket": "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl": "0", "volumes.kubernetes.io/controller-managed-attach-detach": "true" }, "creationTimestamp": "2025-01-31T08:09:18Z", "labels": { "beta.kubernetes.io/arch": "amd64", "beta.kubernetes.io/os": "linux", "io.kubernetes.storage.mock/node": "some-mock-node", "kubernetes.io/arch": "amd64", "kubernetes.io/hostname": "v132-worker2", "kubernetes.io/os": "linux", "topology.hostpath.csi/node": "v132-worker2" }, "name": "v132-worker2", "resourceVersion": "4961618", "uid": "a499c571-be9e-41e0-a4ea-dc082e96fd5a" }, "spec": { "podCIDR": "10.244.1.0/24", "podCIDRs": [ "10.244.1.0/24" ], "providerID": "kind://docker/v132/v132-worker2" }, "status": { "addresses": [ { "address": "172.24.0.8", "type": "InternalIP" }, { "address": "v132-worker2", "type": "Hostname" } ], "allocatable": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "capacity": { "cpu": "88", "ephemeral-storage": "459530328Ki", "hugepages-1Gi": "0", "hugepages-2Mi": "0", "memory": "65832124Ki", "pods": "110" }, "conditions": [ { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient memory available", "reason": "KubeletHasSufficientMemory", "status": "False", "type": "MemoryPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has no disk pressure", "reason": "KubeletHasNoDiskPressure", "status": "False", "type": "DiskPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:18Z", "message": "kubelet has sufficient PID available", "reason": "KubeletHasSufficientPID", "status": "False", "type": "PIDPressure" }, { "lastHeartbeatTime": "2025-03-06T11:53:36Z", "lastTransitionTime": "2025-01-31T08:09:37Z", "message": "kubelet is posting ready status", "reason": "KubeletReady", "status": "True", "type": "Ready" } ], "daemonEndpoints": { "kubeletEndpoint": { "Port": 10250 } }, "images": [ { "names": [ "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6" ], "sizeBytes": 441526217 }, { "names": [ "docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter" ], "sizeBytes": 386500834 }, { "names": [ "docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter" ], "sizeBytes": 360721934 }, { "names": [ "docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter" ], "sizeBytes": 327310970 }, { "names": [ "docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter" ], "sizeBytes": 303708624 }, { "names": [ "docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter" ], "sizeBytes": 295167572 }, { "names": [ "docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter" ], "sizeBytes": 287441316 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0" ], "sizeBytes": 190137665 }, { "names": [ "docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind" ], "sizeBytes": 135326838 }, { "names": [ "docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest" ], "sizeBytes": 118405146 }, { "names": [ "registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7" ], "sizeBytes": 112030336 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0" ], "sizeBytes": 98045934 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0" ], "sizeBytes": 95268026 }, { "names": [ "registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8" ], "sizeBytes": 91036984 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0" ], "sizeBytes": 90783560 }, { "names": [ "docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest" ], "sizeBytes": 72080558 }, { "names": [ "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0" ], "sizeBytes": 70644040 }, { "names": [ "registry.k8s.io/etcd:3.5.16-0" ], "sizeBytes": 57680541 }, { "names": [ "registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53" ], "sizeBytes": 54468442 }, { "names": [ "registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7" ], "sizeBytes": 49641698 }, { "names": [ "docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2" ], "sizeBytes": 43484706 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4" ], "sizeBytes": 41901587 }, { "names": [ "registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4" ], "sizeBytes": 40764257 }, { "names": [ "registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2" ], "sizeBytes": 39672997 }, { "names": [ "docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter" ], "sizeBytes": 39060692 }, { "names": [ "docker.io/kindest/kindnetd:v20241212-9f82dd49" ], "sizeBytes": 39008320 }, { "names": [ "docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8" ], "sizeBytes": 38278203 }, { "names": [ "registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0" ], "sizeBytes": 32167411 }, { "names": [ "registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0" ], "sizeBytes": 31007188 }, { "names": [ "registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0" ], "sizeBytes": 30896583 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0" ], "sizeBytes": 29032757 }, { "names": [ "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" ], "sizeBytes": 27151116 }, { "names": [ "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0" ], "sizeBytes": 22541737 }, { "names": [ "registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0" ], "sizeBytes": 21064317 }, { "names": [ "registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2" ], "sizeBytes": 18651485 }, { "names": [ "registry.k8s.io/coredns/coredns:v1.11.3" ], "sizeBytes": 18562039 }, { "names": [ "registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4" ], "sizeBytes": 17747885 }, { "names": [ "docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2" ], "sizeBytes": 17168059 }, { "names": [ "registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0" ], "sizeBytes": 14038309 }, { "names": [ "docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7" ], "sizeBytes": 13598515 }, { "names": [ "docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0" ], "sizeBytes": 12945155 }, { "names": [ "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1" ], "sizeBytes": 12935701 }, { "names": [ "quay.io/coreos/etcd:v2.2.5" ], "sizeBytes": 7670543 }, { "names": [ "registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4" ], "sizeBytes": 6978614 }, { "names": [ "docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1" ], "sizeBytes": 6446327 }, { "names": [ "gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0" ], "sizeBytes": 4381769 }, { "names": [ "registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3" ], "sizeBytes": 3263463 }, { "names": [ "docker.io/kindest/local-path-helper:v20241212-8ac705d0" ], "sizeBytes": 3084671 }, { "names": [ "docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge" ], "sizeBytes": 2854657 }, { "names": [ "registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1" ], "sizeBytes": 2223659 } ], "nodeInfo": { "architecture": "amd64", "bootID": "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion": "containerd://1.7.24", "kernelVersion": "5.15.0-53-generic", "kubeProxyVersion": "v1.32.0", "kubeletVersion": "v1.32.0", "machineID": "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem": "linux", "osImage": "Debian GNU/Linux 12 (bookworm)", "systemUUID": "960341c8-b3a9-4b4a-bb0c-142338daaac6" } } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: resource_map items : [{"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4961618", "uid" => "a499c571-be9e-41e0-a4ea-dc082e96fd5a"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest"], "sizeBytes" => 72080558}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "960341c8-b3a9-4b4a-bb0c-142338daaac6"}}}] D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: nodes: [{"apiVersion" => "v1", "kind" => "Node", "metadata" => {"annotations" => {"kubeadm.alpha.kubernetes.io/cri-socket" => "unix:///run/containerd/containerd.sock", "node.alpha.kubernetes.io/ttl" => "0", "volumes.kubernetes.io/controller-managed-attach-detach" => "true"}, "creationTimestamp" => "2025-01-31T08:09:18Z", "labels" => {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"}, "name" => "v132-worker2", "resourceVersion" => "4961618", "uid" => "a499c571-be9e-41e0-a4ea-dc082e96fd5a"}, "spec" => {"podCIDR" => "10.244.1.0/24", "podCIDRs" => ["10.244.1.0/24"], "providerID" => "kind://docker/v132/v132-worker2"}, "status" => {"addresses" => [{"address" => "172.24.0.8", "type" => "InternalIP"}, {"address" => "v132-worker2", "type" => "Hostname"}], "allocatable" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "capacity" => {"cpu" => "88", "ephemeral-storage" => "459530328Ki", "hugepages-1Gi" => "0", "hugepages-2Mi" => "0", "memory" => "65832124Ki", "pods" => "110"}, "conditions" => [{"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient memory available", "reason" => "KubeletHasSufficientMemory", "status" => "False", "type" => "MemoryPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has no disk pressure", "reason" => "KubeletHasNoDiskPressure", "status" => "False", "type" => "DiskPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:18Z", "message" => "kubelet has sufficient PID available", "reason" => "KubeletHasSufficientPID", "status" => "False", "type" => "PIDPressure"}, {"lastHeartbeatTime" => "2025-03-06T11:53:36Z", "lastTransitionTime" => "2025-01-31T08:09:37Z", "message" => "kubelet is posting ready status", "reason" => "KubeletReady", "status" => "True", "type" => "Ready"}], "daemonEndpoints" => {"kubeletEndpoint" => {"Port" => 10250}}, "images" => [{"names" => ["docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "docker.io/lfncnti/cluster-tools:v1.0.6"], "sizeBytes" => 441526217}, {"names" => ["docker.io/ollivier/clearwater-cassandra@sha256:7460a5e29c91e16bd36534b5284b27832e1c6e0f7c22a4bb79eda79942d250e1", "docker.io/ollivier/clearwater-cassandra:hunter"], "sizeBytes" => 386500834}, {"names" => ["docker.io/ollivier/clearwater-homestead-prov@sha256:ef3803b4336ea217f9a467dac7f5c4bc3d2cd0f3cbbcc6c101419506fc3a6fa4", "docker.io/ollivier/clearwater-homestead-prov:hunter"], "sizeBytes" => 360721934}, {"names" => ["docker.io/ollivier/clearwater-astaire@sha256:5bc730435563dc3e31f3a3b7bb58b5899c453929b624052622b3a9a1c2fd04d8", "docker.io/ollivier/clearwater-astaire:hunter"], "sizeBytes" => 327310970}, {"names" => ["docker.io/ollivier/clearwater-bono@sha256:0da41ddbf72c158f8e617015450587634cdf6856696005601b2108df92a27254", "docker.io/ollivier/clearwater-bono:hunter"], "sizeBytes" => 303708624}, {"names" => ["docker.io/ollivier/clearwater-homestead@sha256:8467d6c9caefa6a402eba927ee31f8179b2dc3386ac4768dd04f4bd630a1b9e9", "docker.io/ollivier/clearwater-homestead:hunter"], "sizeBytes" => 295167572}, {"names" => ["docker.io/ollivier/clearwater-ralf@sha256:7054a741dbd4ea45fa4efd8138c07e21d35fbed627971559de5df2d03883e94f", "docker.io/ollivier/clearwater-ralf:hunter"], "sizeBytes" => 287441316}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/go-runner@sha256:4664e5d3eba9f9f805900045fc632dd4f35d96b9a744800c0eade4fde45de681", "litmuschaos.docker.scarf.sh/litmuschaos/go-runner:3.6.0"], "sizeBytes" => 190137665}, {"names" => ["docker.io/library/docker@sha256:3ab005a2e4872f0b10fb9c00d4230334043f1281f29299bd3de94a8f14a05e69", "docker.io/library/docker:dind"], "sizeBytes" => 135326838}, {"names" => ["docker.io/sirot/netperf-latest@sha256:23929b922bb077cb341450fc1c90ae42e6f75da5d7ce61cd1880b08560a5ff85", "docker.io/sirot/netperf-latest:latest"], "sizeBytes" => 118405146}, {"names" => ["registry.k8s.io/e2e-test-images/jessie-dnsutils@sha256:24aaf2626d6b27864c29de2097e8bbb840b3a414271bf7c8995e431e47d8408e", "registry.k8s.io/e2e-test-images/jessie-dnsutils:1.7"], "sizeBytes" => 112030336}, {"names" => ["docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "registry.k8s.io/kube-apiserver:v1.32.0"], "sizeBytes" => 98045934}, {"names" => ["docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "registry.k8s.io/kube-proxy-amd64:v1.32.0", "registry.k8s.io/kube-proxy:v1.32.0"], "sizeBytes" => 95268026}, {"names" => ["registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d", "registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8"], "sizeBytes" => 91036984}, {"names" => ["docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "registry.k8s.io/kube-controller-manager:v1.32.0"], "sizeBytes" => 90783560}, {"names" => ["docker.io/library/nginx@sha256:0a399eb16751829e1af26fea27b20c3ec28d7ab1fb72182879dcae1cca21206a", "docker.io/library/nginx:latest"], "sizeBytes" => 72080558}, {"names" => ["docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "registry.k8s.io/kube-scheduler:v1.32.0"], "sizeBytes" => 70644040}, {"names" => ["registry.k8s.io/etcd:3.5.16-0"], "sizeBytes" => 57680541}, {"names" => ["registry.k8s.io/e2e-test-images/agnhost@sha256:99c6b4bb4a1e1df3f0b3752168c89358794d02258ebebc26bf21c29399011a85", "registry.k8s.io/e2e-test-images/agnhost:2.53"], "sizeBytes" => 54468442}, {"names" => ["registry.k8s.io/e2e-test-images/nautilus@sha256:80ba6c8c44f9623f06e868a1aa66026c8ec438ad814f9ec95e9333b415fe3550", "registry.k8s.io/e2e-test-images/nautilus:1.7"], "sizeBytes" => 49641698}, {"names" => ["docker.io/openpolicyagent/gatekeeper@sha256:1a74a853ecff3dfcfa742e8abda8d18fd426c29d80f42df55801c453595348c3", "docker.io/openpolicyagent/gatekeeper:v3.18.2"], "sizeBytes" => 43484706}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:3fe7acf013d1264ffded116b80a73dc129a449b0fccdb8d21af8279f2233f36e", "registry.k8s.io/e2e-test-images/httpd:2.4.39-4"], "sizeBytes" => 41901587}, {"names" => ["registry.k8s.io/e2e-test-images/httpd@sha256:148b022f5c5da426fc2f3c14b5c0867e58ef05961510c84749ac1fddcb0fef22", "registry.k8s.io/e2e-test-images/httpd:2.4.38-4"], "sizeBytes" => 40764257}, {"names" => ["registry.k8s.io/e2e-test-images/sample-apiserver@sha256:19d4ecf1e0731b9ea55aca9c070d520f68b96ed0defbcc0e4eefe97b3d663ca3", "registry.k8s.io/e2e-test-images/sample-apiserver:1.29.2"], "sizeBytes" => 39672997}, {"names" => ["docker.io/ollivier/clearwater-live-test@sha256:1ec1c46f531b5466e62e2a3f1e65e97336e8ea0ca50f11a4305775d6aeac9a58", "docker.io/ollivier/clearwater-live-test:hunter"], "sizeBytes" => 39060692}, {"names" => ["docker.io/kindest/kindnetd:v20241212-9f82dd49"], "sizeBytes" => 39008320}, {"names" => ["docker.io/aquasec/kube-hunter@sha256:e64fe49f059f513a09c772a8972172b2af6833d092c06cc311171d7135e4525a", "docker.io/aquasec/kube-hunter:0.6.8"], "sizeBytes" => 38278203}, {"names" => ["registry.k8s.io/sig-storage/csi-provisioner@sha256:672e45d6a55678abc1d102de665b5cbd63848e75dc7896f238c8eaaf3c7d322f", "registry.k8s.io/sig-storage/csi-provisioner:v5.1.0"], "sizeBytes" => 32167411}, {"names" => ["registry.k8s.io/sig-storage/csi-attacher@sha256:6e54dae32284f60a2de1645c527715e4c934e5ce7899560c0d845bac957118dc", "registry.k8s.io/sig-storage/csi-attacher:v4.7.0"], "sizeBytes" => 31007188}, {"names" => ["registry.k8s.io/sig-storage/csi-resizer@sha256:ab774734705a906561e15b67f6a96538f3ad520335d636f793aaafe87a3b5200", "registry.k8s.io/sig-storage/csi-resizer:v1.12.0"], "sizeBytes" => 30896583}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0"], "sizeBytes" => 29032757}, {"names" => ["litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner@sha256:a762f650ce60ab0698c79e4b646c941933fab46837c69a0a888addb6bda0ccb6", "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"], "sizeBytes" => 27151116}, {"names" => ["docker.io/kindest/local-path-provisioner:v20241212-8ac705d0"], "sizeBytes" => 22541737}, {"names" => ["registry.k8s.io/sig-storage/hostpathplugin@sha256:eb5f6cdf5c71f786de53829e76965a191e08ce9b28becce9daef198e7346eb06", "registry.k8s.io/sig-storage/hostpathplugin:v1.15.0"], "sizeBytes" => 21064317}, {"names" => ["registry.k8s.io/e2e-test-images/regression-issue-74839@sha256:b4f1d8d61bdad84bd50442d161d5460e4019d53e989b64220fdbc62fc87d76bf", "registry.k8s.io/e2e-test-images/regression-issue-74839:1.2"], "sizeBytes" => 18651485}, {"names" => ["registry.k8s.io/coredns/coredns:v1.11.3"], "sizeBytes" => 18562039}, {"names" => ["registry.k8s.io/e2e-test-images/nonroot@sha256:ee9f50b3c64b174d296d91ca9f69a914ac30e59095dfb462b2b518ad28a63655", "registry.k8s.io/e2e-test-images/nonroot:1.4"], "sizeBytes" => 17747885}, {"names" => ["docker.io/openpolicyagent/gatekeeper-crds@sha256:403470b0a32147a1a1a7c3fd834823a071bc7b1f4c62d0d931135108066cfc99", "docker.io/openpolicyagent/gatekeeper-crds:v3.18.2"], "sizeBytes" => 17168059}, {"names" => ["registry.k8s.io/sig-storage/csi-node-driver-registrar@sha256:0d23a6fd60c421054deec5e6d0405dc3498095a5a597e175236c0692f4adee0f", "registry.k8s.io/sig-storage/csi-node-driver-registrar:v2.12.0"], "sizeBytes" => 14038309}, {"names" => ["docker.io/coredns/coredns@sha256:2c8d61c46f484d881db43b34d13ca47a269336e576c81cf007ca740fa9ec0800", "docker.io/coredns/coredns:1.6.7"], "sizeBytes" => 13598515}, {"names" => ["docker.io/coredns/coredns@sha256:cc8fb77bc2a0541949d1d9320a641b82fd392b0d3d8145469ca4709ae769980e", "docker.io/coredns/coredns:1.8.0"], "sizeBytes" => 12945155}, {"names" => ["docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "docker.io/coredns/coredns:1.7.1"], "sizeBytes" => 12935701}, {"names" => ["quay.io/coreos/etcd:v2.2.5"], "sizeBytes" => 7670543}, {"names" => ["registry.k8s.io/e2e-test-images/nginx@sha256:5c99cf6a02adda929b10321dbf4ecfa00d87be9ba4fb456006237d530ab4baa1", "registry.k8s.io/e2e-test-images/nginx:1.14-4"], "sizeBytes" => 6978614}, {"names" => ["docker.io/curlimages/curl@sha256:e83fef2d5a036d40df4ded829141e8c0ec41871490d252fb8c81cb4580ebb35b", "docker.io/curlimages/curl:7.83.1"], "sizeBytes" => 6446327}, {"names" => ["gcr.io/google-samples/hello-go-gke@sha256:4ea9cd3d35f81fc91bdebca3fae50c180a1048be0613ad0f811595365040396e", "gcr.io/google-samples/hello-go-gke:1.0"], "sizeBytes" => 4381769}, {"names" => ["registry.k8s.io/e2e-test-images/nonewprivs@sha256:8ac1264691820febacf3aea5d152cbde6d10685731ec14966a9401c6f47a68ac", "registry.k8s.io/e2e-test-images/nonewprivs:1.3"], "sizeBytes" => 3263463}, {"names" => ["docker.io/kindest/local-path-helper:v20241212-8ac705d0"], "sizeBytes" => 3084671}, {"names" => ["docker.io/appropriate/curl@sha256:027a0ad3c69d085fea765afca9984787b780c172cead6502fec989198b98d8bb", "docker.io/appropriate/curl:edge"], "sizeBytes" => 2854657}, {"names" => ["registry.k8s.io/e2e-test-images/busybox@sha256:a9155b13325b2abef48e71de77bb8ac015412a566829f621d06bfae5c699b1b9", "registry.k8s.io/e2e-test-images/busybox:1.36.1-1"], "sizeBytes" => 2223659}], "nodeInfo" => {"architecture" => "amd64", "bootID" => "d52356e5-71e5-4116-b104-65900319af7a", "containerRuntimeVersion" => "containerd://1.7.24", "kernelVersion" => "5.15.0-53-generic", "kubeProxyVersion" => "v1.32.0", "kubeletVersion" => "v1.32.0", "machineID" => "f5f5a2e6a17d4f15b8e9d3217387bcd4", "operatingSystem" => "linux", "osImage" => "Debian GNU/Linux 12 (bookworm)", "systemUUID" => "960341c8-b3a9-4b4a-bb0c-142338daaac6"}}}] I, [2025-03-06 11:57:56 UTC #1422] INFO -- cnf-testsuite-sig_term_handled: nodes_by_resource done I, [2025-03-06 11:57:56 UTC #1422] INFO -- cnf-testsuite-sig_term_handled: before ready containerStatuses pod:coredns-coredns-64fc886fd4-clwtn container:coredns I, [2025-03-06 11:57:56 UTC #1422] INFO -- cnf-testsuite-sig_term_handled: containerStatuses container_id containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782 I, [2025-03-06 11:57:56 UTC #1422] INFO -- cnf-testsuite: node_pid_by_container_id container_id: containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782 I, [2025-03-06 11:57:56 UTC #1422] INFO -- cnf-testsuite: parse_container_id container_id: containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782 I, [2025-03-06 11:57:56 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:56 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- crictl inspect 8ea7a033d5ed83 I, [2025-03-06 11:57:56 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- crictl inspect 8ea7a033d5ed83 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: { "status": { "id": "8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "metadata": { "attempt": 0, "name": "coredns" }, "state": "CONTAINER_RUNNING", "createdAt": "2025-03-06T11:53:46.309860166Z", "startedAt": "2025-03-06T11:53:47.994396555Z", "finishedAt": "1970-01-01T00:00:00Z", "exitCode": 0, "image": { "image": "docker.io/coredns/coredns:1.7.1" }, "imageRef": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "reason": "", "message": "", "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "annotations": { "io.kubernetes.container.hash": "30544dd1", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "mounts": [ { "containerPath": "/etc/coredns", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "selinuxRelabel": false }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "selinuxRelabel": false }, { "containerPath": "/etc/hosts", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "selinuxRelabel": false }, { "containerPath": "/dev/termination-log", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "selinuxRelabel": false } ], "logPath": "/var/log/pods/cnf-default_coredns-coredns-64fc886fd4-clwtn_1493bcca-c392-4f42-8125-d050b7590390/coredns/0.log" }, "info": { "sandboxID": "87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299", "pid": 3113417, "removing": false, "snapshotKey": "8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "snapshotter": "overlayfs", "runtimeType": "io.containerd.runc.v2", "runtimeOptions": { "systemd_cgroup": true }, "config": { "metadata": { "name": "coredns" }, "image": { "image": "sha256:0a6cfbf7b0b6606f404f703a3ce24f3f637437b2d06d38008c033c42a2860f5f" }, "args": [ "-conf", "/etc/coredns/Corefile" ], "envs": [ { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "COREDNS_COREDNS_SERVICE_PORT", "value": "53" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_TCP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT", "value": "udp://10.96.24.213:53" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_ADDR", "value": "10.96.24.213" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "COREDNS_COREDNS_SERVICE_HOST", "value": "10.96.24.213" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PROTO", "value": "udp" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PORT", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_TCP", "value": "tcp://10.96.24.213:53" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PORT", "value": "53" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_UDP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP", "value": "udp://10.96.24.213:53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_ADDR", "value": "10.96.24.213" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" } ], "mounts": [ { "container_path": "/etc/coredns", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume", "readonly": true }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8" } ], "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "annotations": { "io.kubernetes.container.hash": "30544dd1", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "log_path": "coredns/0.log", "linux": { "resources": { "cpu_period": 100000, "cpu_quota": 10000, "cpu_shares": 102, "memory_limit_in_bytes": 134217728, "oom_score_adj": -997, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "memory_swap_limit_in_bytes": 134217728 }, "security_context": { "namespace_options": { "pid": 1 }, "run_as_user": {}, "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "seccomp": { "profile_type": 1 } } } }, "runtimeSpec": { "ociVersion": "1.1.0", "process": { "user": { "uid": 0, "gid": 0, "additionalGids": [ 0 ] }, "args": [ "/coredns", "-conf", "/etc/coredns/Corefile" ], "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=coredns-coredns-64fc886fd4-clwtn", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "COREDNS_COREDNS_SERVICE_PORT=53", "COREDNS_COREDNS_SERVICE_PORT_TCP_53=53", "COREDNS_COREDNS_PORT=udp://10.96.24.213:53", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "COREDNS_COREDNS_PORT_53_TCP_ADDR=10.96.24.213", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_PORT=tcp://10.96.0.1:443", "COREDNS_COREDNS_SERVICE_HOST=10.96.24.213", "COREDNS_COREDNS_PORT_53_UDP_PROTO=udp", "COREDNS_COREDNS_PORT_53_UDP_PORT=53", "COREDNS_COREDNS_PORT_53_TCP=tcp://10.96.24.213:53", "COREDNS_COREDNS_PORT_53_TCP_PORT=53", "KUBERNETES_PORT_443_TCP_PORT=443", "COREDNS_COREDNS_SERVICE_PORT_UDP_53=53", "COREDNS_COREDNS_PORT_53_UDP=udp://10.96.24.213:53", "COREDNS_COREDNS_PORT_53_UDP_ADDR=10.96.24.213", "COREDNS_COREDNS_PORT_53_TCP_PROTO=tcp", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_SERVICE_HOST=10.96.0.1" ], "cwd": "/", "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ] }, "oomScoreAdj": -997 }, "root": { "path": "rootfs" }, "mounts": [ { "destination": "/proc", "type": "proc", "source": "proc", "options": [ "nosuid", "noexec", "nodev" ] }, { "destination": "/dev", "type": "tmpfs", "source": "tmpfs", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ] }, { "destination": "/dev/pts", "type": "devpts", "source": "devpts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ] }, { "destination": "/dev/mqueue", "type": "mqueue", "source": "mqueue", "options": [ "nosuid", "noexec", "nodev" ] }, { "destination": "/sys", "type": "sysfs", "source": "sysfs", "options": [ "nosuid", "noexec", "nodev", "ro" ] }, { "destination": "/sys/fs/cgroup", "type": "cgroup", "source": "cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ] }, { "destination": "/etc/coredns", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume", "options": [ "rbind", "rprivate", "ro" ] }, { "destination": "/etc/hosts", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/dev/termination-log", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/etc/hostname", "type": "bind", "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/hostname", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/etc/resolv.conf", "type": "bind", "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/resolv.conf", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/dev/shm", "type": "bind", "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/shm", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz", "options": [ "rbind", "rprivate", "ro" ] } ], "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "annotations": { "io.kubernetes.cri.container-name": "coredns", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "docker.io/coredns/coredns:1.7.1", "io.kubernetes.cri.sandbox-id": "87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299", "io.kubernetes.cri.sandbox-name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.cri.sandbox-namespace": "cnf-default", "io.kubernetes.cri.sandbox-uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "linux": { "resources": { "devices": [ { "allow": false, "access": "rwm" } ], "memory": { "limit": 134217728, "swap": 134217728 }, "cpu": { "shares": 102, "quota": 10000, "period": 100000 } }, "cgroupsPath": "kubelet-kubepods-pod1493bcca_c392_4f42_8125_d050b7590390.slice:cri-containerd:8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "namespaces": [ { "type": "pid" }, { "type": "ipc", "path": "/proc/3113384/ns/ipc" }, { "type": "uts", "path": "/proc/3113384/ns/uts" }, { "type": "mount" }, { "type": "network", "path": "/proc/3113384/ns/net" } ], "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ] } } } } D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "{\n \"status\": {\n \"id\": \"8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782\",\n \"metadata\": {\n \"attempt\": 0,\n \"name\": \"coredns\"\n },\n \"state\": \"CONTAINER_RUNNING\",\n \"createdAt\": \"2025-03-06T11:53:46.309860166Z\",\n \"startedAt\": \"2025-03-06T11:53:47.994396555Z\",\n \"finishedAt\": \"1970-01-01T00:00:00Z\",\n \"exitCode\": 0,\n \"image\": {\n \"image\": \"docker.io/coredns/coredns:1.7.1\"\n },\n \"imageRef\": \"docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef\",\n \"reason\": \"\",\n \"message\": \"\",\n \"labels\": {\n \"io.kubernetes.container.name\": \"coredns\",\n \"io.kubernetes.pod.name\": \"coredns-coredns-64fc886fd4-clwtn\",\n \"io.kubernetes.pod.namespace\": \"cnf-default\",\n \"io.kubernetes.pod.uid\": \"1493bcca-c392-4f42-8125-d050b7590390\"\n },\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"30544dd1\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"udp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"UDP\\\"},{\\\"name\\\":\\\"tcp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"mounts\": [\n {\n \"containerPath\": \"/etc/coredns\",\n \"hostPath\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"selinuxRelabel\": false\n },\n {\n \"containerPath\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"hostPath\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": true,\n \"selinuxRelabel\": false\n },\n {\n \"containerPath\": \"/etc/hosts\",\n \"hostPath\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"selinuxRelabel\": false\n },\n {\n \"containerPath\": \"/dev/termination-log\",\n \"hostPath\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8\",\n \"propagation\": \"PROPAGATION_PRIVATE\",\n \"readonly\": false,\n \"selinuxRelabel\": false\n }\n ],\n \"logPath\": \"/var/log/pods/cnf-default_coredns-coredns-64fc886fd4-clwtn_1493bcca-c392-4f42-8125-d050b7590390/coredns/0.log\"\n },\n \"info\": {\n \"sandboxID\": \"87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299\",\n \"pid\": 3113417,\n \"removing\": false,\n \"snapshotKey\": \"8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782\",\n \"snapshotter\": \"overlayfs\",\n \"runtimeType\": \"io.containerd.runc.v2\",\n \"runtimeOptions\": {\n \"systemd_cgroup\": true\n },\n \"config\": {\n \"metadata\": {\n \"name\": \"coredns\"\n },\n \"image\": {\n \"image\": \"sha256:0a6cfbf7b0b6606f404f703a3ce24f3f637437b2d06d38008c033c42a2860f5f\"\n },\n \"args\": [\n \"-conf\",\n \"/etc/coredns/Corefile\"\n ],\n \"envs\": [\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_ADDR\",\n \"value\": \"10.96.0.1\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT_TCP_53\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT\",\n \"value\": \"udp://10.96.24.213:53\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_ADDR\",\n \"value\": \"10.96.24.213\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_PORT\",\n \"value\": \"tcp://10.96.0.1:443\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_HOST\",\n \"value\": \"10.96.24.213\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_PROTO\",\n \"value\": \"udp\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP\",\n \"value\": \"tcp://10.96.24.213:53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_PORT\",\n \"value\": \"53\"\n },\n {\n \"key\": \"KUBERNETES_PORT_443_TCP_PORT\",\n \"value\": \"443\"\n },\n {\n \"key\": \"COREDNS_COREDNS_SERVICE_PORT_UDP_53\",\n \"value\": \"53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP\",\n \"value\": \"udp://10.96.24.213:53\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_UDP_ADDR\",\n \"value\": \"10.96.24.213\"\n },\n {\n \"key\": \"COREDNS_COREDNS_PORT_53_TCP_PROTO\",\n \"value\": \"tcp\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_PORT_HTTPS\",\n \"value\": \"443\"\n },\n {\n \"key\": \"KUBERNETES_SERVICE_HOST\",\n \"value\": \"10.96.0.1\"\n }\n ],\n \"mounts\": [\n {\n \"container_path\": \"/etc/coredns\",\n \"host_path\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"host_path\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz\",\n \"readonly\": true\n },\n {\n \"container_path\": \"/etc/hosts\",\n \"host_path\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts\"\n },\n {\n \"container_path\": \"/dev/termination-log\",\n \"host_path\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8\"\n }\n ],\n \"labels\": {\n \"io.kubernetes.container.name\": \"coredns\",\n \"io.kubernetes.pod.name\": \"coredns-coredns-64fc886fd4-clwtn\",\n \"io.kubernetes.pod.namespace\": \"cnf-default\",\n \"io.kubernetes.pod.uid\": \"1493bcca-c392-4f42-8125-d050b7590390\"\n },\n \"annotations\": {\n \"io.kubernetes.container.hash\": \"30544dd1\",\n \"io.kubernetes.container.ports\": \"[{\\\"name\\\":\\\"udp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"UDP\\\"},{\\\"name\\\":\\\"tcp-53\\\",\\\"containerPort\\\":53,\\\"protocol\\\":\\\"TCP\\\"}]\",\n \"io.kubernetes.container.restartCount\": \"0\",\n \"io.kubernetes.container.terminationMessagePath\": \"/dev/termination-log\",\n \"io.kubernetes.container.terminationMessagePolicy\": \"File\",\n \"io.kubernetes.pod.terminationGracePeriod\": \"30\"\n },\n \"log_path\": \"coredns/0.log\",\n \"linux\": {\n \"resources\": {\n \"cpu_period\": 100000,\n \"cpu_quota\": 10000,\n \"cpu_shares\": 102,\n \"memory_limit_in_bytes\": 134217728,\n \"oom_score_adj\": -997,\n \"hugepage_limits\": [\n {\n \"page_size\": \"2MB\"\n },\n {\n \"page_size\": \"1GB\"\n }\n ],\n \"memory_swap_limit_in_bytes\": 134217728\n },\n \"security_context\": {\n \"namespace_options\": {\n \"pid\": 1\n },\n \"run_as_user\": {},\n \"masked_paths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"readonly_paths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ],\n \"seccomp\": {\n \"profile_type\": 1\n }\n }\n }\n },\n \"runtimeSpec\": {\n \"ociVersion\": \"1.1.0\",\n \"process\": {\n \"user\": {\n \"uid\": 0,\n \"gid\": 0,\n \"additionalGids\": [\n 0\n ]\n },\n \"args\": [\n \"/coredns\",\n \"-conf\",\n \"/etc/coredns/Corefile\"\n ],\n \"env\": [\n \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n \"HOSTNAME=coredns-coredns-64fc886fd4-clwtn\",\n \"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1\",\n \"COREDNS_COREDNS_SERVICE_PORT=53\",\n \"COREDNS_COREDNS_SERVICE_PORT_TCP_53=53\",\n \"COREDNS_COREDNS_PORT=udp://10.96.24.213:53\",\n \"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443\",\n \"KUBERNETES_PORT_443_TCP_PROTO=tcp\",\n \"COREDNS_COREDNS_PORT_53_TCP_ADDR=10.96.24.213\",\n \"KUBERNETES_SERVICE_PORT=443\",\n \"KUBERNETES_PORT=tcp://10.96.0.1:443\",\n \"COREDNS_COREDNS_SERVICE_HOST=10.96.24.213\",\n \"COREDNS_COREDNS_PORT_53_UDP_PROTO=udp\",\n \"COREDNS_COREDNS_PORT_53_UDP_PORT=53\",\n \"COREDNS_COREDNS_PORT_53_TCP=tcp://10.96.24.213:53\",\n \"COREDNS_COREDNS_PORT_53_TCP_PORT=53\",\n \"KUBERNETES_PORT_443_TCP_PORT=443\",\n \"COREDNS_COREDNS_SERVICE_PORT_UDP_53=53\",\n \"COREDNS_COREDNS_PORT_53_UDP=udp://10.96.24.213:53\",\n \"COREDNS_COREDNS_PORT_53_UDP_ADDR=10.96.24.213\",\n \"COREDNS_COREDNS_PORT_53_TCP_PROTO=tcp\",\n \"KUBERNETES_SERVICE_PORT_HTTPS=443\",\n \"KUBERNETES_SERVICE_HOST=10.96.0.1\"\n ],\n \"cwd\": \"/\",\n \"capabilities\": {\n \"bounding\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ],\n \"effective\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ],\n \"permitted\": [\n \"CAP_CHOWN\",\n \"CAP_DAC_OVERRIDE\",\n \"CAP_FSETID\",\n \"CAP_FOWNER\",\n \"CAP_MKNOD\",\n \"CAP_NET_RAW\",\n \"CAP_SETGID\",\n \"CAP_SETUID\",\n \"CAP_SETFCAP\",\n \"CAP_SETPCAP\",\n \"CAP_NET_BIND_SERVICE\",\n \"CAP_SYS_CHROOT\",\n \"CAP_KILL\",\n \"CAP_AUDIT_WRITE\"\n ]\n },\n \"oomScoreAdj\": -997\n },\n \"root\": {\n \"path\": \"rootfs\"\n },\n \"mounts\": [\n {\n \"destination\": \"/proc\",\n \"type\": \"proc\",\n \"source\": \"proc\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ]\n },\n {\n \"destination\": \"/dev\",\n \"type\": \"tmpfs\",\n \"source\": \"tmpfs\",\n \"options\": [\n \"nosuid\",\n \"strictatime\",\n \"mode=755\",\n \"size=65536k\"\n ]\n },\n {\n \"destination\": \"/dev/pts\",\n \"type\": \"devpts\",\n \"source\": \"devpts\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"newinstance\",\n \"ptmxmode=0666\",\n \"mode=0620\",\n \"gid=5\"\n ]\n },\n {\n \"destination\": \"/dev/mqueue\",\n \"type\": \"mqueue\",\n \"source\": \"mqueue\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\"\n ]\n },\n {\n \"destination\": \"/sys\",\n \"type\": \"sysfs\",\n \"source\": \"sysfs\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"ro\"\n ]\n },\n {\n \"destination\": \"/sys/fs/cgroup\",\n \"type\": \"cgroup\",\n \"source\": \"cgroup\",\n \"options\": [\n \"nosuid\",\n \"noexec\",\n \"nodev\",\n \"relatime\",\n \"ro\"\n ]\n },\n {\n \"destination\": \"/etc/coredns\",\n \"type\": \"bind\",\n \"source\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ]\n },\n {\n \"destination\": \"/etc/hosts\",\n \"type\": \"bind\",\n \"source\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ]\n },\n {\n \"destination\": \"/dev/termination-log\",\n \"type\": \"bind\",\n \"source\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ]\n },\n {\n \"destination\": \"/etc/hostname\",\n \"type\": \"bind\",\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/hostname\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ]\n },\n {\n \"destination\": \"/etc/resolv.conf\",\n \"type\": \"bind\",\n \"source\": \"/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/resolv.conf\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ]\n },\n {\n \"destination\": \"/dev/shm\",\n \"type\": \"bind\",\n \"source\": \"/run/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/shm\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"rw\"\n ]\n },\n {\n \"destination\": \"/var/run/secrets/kubernetes.io/serviceaccount\",\n \"type\": \"bind\",\n \"source\": \"/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz\",\n \"options\": [\n \"rbind\",\n \"rprivate\",\n \"ro\"\n ]\n }\n ],\n \"hooks\": {\n \"createContainer\": [\n {\n \"path\": \"/kind/bin/mount-product-files.sh\"\n }\n ]\n },\n \"annotations\": {\n \"io.kubernetes.cri.container-name\": \"coredns\",\n \"io.kubernetes.cri.container-type\": \"container\",\n \"io.kubernetes.cri.image-name\": \"docker.io/coredns/coredns:1.7.1\",\n \"io.kubernetes.cri.sandbox-id\": \"87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299\",\n \"io.kubernetes.cri.sandbox-name\": \"coredns-coredns-64fc886fd4-clwtn\",\n \"io.kubernetes.cri.sandbox-namespace\": \"cnf-default\",\n \"io.kubernetes.cri.sandbox-uid\": \"1493bcca-c392-4f42-8125-d050b7590390\"\n },\n \"linux\": {\n \"resources\": {\n \"devices\": [\n {\n \"allow\": false,\n \"access\": \"rwm\"\n }\n ],\n \"memory\": {\n \"limit\": 134217728,\n \"swap\": 134217728\n },\n \"cpu\": {\n \"shares\": 102,\n \"quota\": 10000,\n \"period\": 100000\n }\n },\n \"cgroupsPath\": \"kubelet-kubepods-pod1493bcca_c392_4f42_8125_d050b7590390.slice:cri-containerd:8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782\",\n \"namespaces\": [\n {\n \"type\": \"pid\"\n },\n {\n \"type\": \"ipc\",\n \"path\": \"/proc/3113384/ns/ipc\"\n },\n {\n \"type\": \"uts\",\n \"path\": \"/proc/3113384/ns/uts\"\n },\n {\n \"type\": \"mount\"\n },\n {\n \"type\": \"network\",\n \"path\": \"/proc/3113384/ns/net\"\n }\n ],\n \"maskedPaths\": [\n \"/proc/asound\",\n \"/proc/acpi\",\n \"/proc/kcore\",\n \"/proc/keys\",\n \"/proc/latency_stats\",\n \"/proc/timer_list\",\n \"/proc/timer_stats\",\n \"/proc/sched_debug\",\n \"/proc/scsi\",\n \"/sys/firmware\",\n \"/sys/devices/virtual/powercap\"\n ],\n \"readonlyPaths\": [\n \"/proc/bus\",\n \"/proc/fs\",\n \"/proc/irq\",\n \"/proc/sys\",\n \"/proc/sysrq-trigger\"\n ]\n }\n }\n }\n}\n", error: ""} D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: node_pid_by_container_id inspect: { "status": { "id": "8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "metadata": { "attempt": 0, "name": "coredns" }, "state": "CONTAINER_RUNNING", "createdAt": "2025-03-06T11:53:46.309860166Z", "startedAt": "2025-03-06T11:53:47.994396555Z", "finishedAt": "1970-01-01T00:00:00Z", "exitCode": 0, "image": { "image": "docker.io/coredns/coredns:1.7.1" }, "imageRef": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "reason": "", "message": "", "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "annotations": { "io.kubernetes.container.hash": "30544dd1", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "mounts": [ { "containerPath": "/etc/coredns", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "selinuxRelabel": false }, { "containerPath": "/var/run/secrets/kubernetes.io/serviceaccount", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz", "propagation": "PROPAGATION_PRIVATE", "readonly": true, "selinuxRelabel": false }, { "containerPath": "/etc/hosts", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "selinuxRelabel": false }, { "containerPath": "/dev/termination-log", "hostPath": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8", "propagation": "PROPAGATION_PRIVATE", "readonly": false, "selinuxRelabel": false } ], "logPath": "/var/log/pods/cnf-default_coredns-coredns-64fc886fd4-clwtn_1493bcca-c392-4f42-8125-d050b7590390/coredns/0.log" }, "info": { "sandboxID": "87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299", "pid": 3113417, "removing": false, "snapshotKey": "8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "snapshotter": "overlayfs", "runtimeType": "io.containerd.runc.v2", "runtimeOptions": { "systemd_cgroup": true }, "config": { "metadata": { "name": "coredns" }, "image": { "image": "sha256:0a6cfbf7b0b6606f404f703a3ce24f3f637437b2d06d38008c033c42a2860f5f" }, "args": [ "-conf", "/etc/coredns/Corefile" ], "envs": [ { "key": "KUBERNETES_PORT_443_TCP_ADDR", "value": "10.96.0.1" }, { "key": "COREDNS_COREDNS_SERVICE_PORT", "value": "53" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_TCP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT", "value": "udp://10.96.24.213:53" }, { "key": "KUBERNETES_PORT_443_TCP", "value": "tcp://10.96.0.1:443" }, { "key": "KUBERNETES_PORT_443_TCP_PROTO", "value": "tcp" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_ADDR", "value": "10.96.24.213" }, { "key": "KUBERNETES_SERVICE_PORT", "value": "443" }, { "key": "KUBERNETES_PORT", "value": "tcp://10.96.0.1:443" }, { "key": "COREDNS_COREDNS_SERVICE_HOST", "value": "10.96.24.213" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PROTO", "value": "udp" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_PORT", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_TCP", "value": "tcp://10.96.24.213:53" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PORT", "value": "53" }, { "key": "KUBERNETES_PORT_443_TCP_PORT", "value": "443" }, { "key": "COREDNS_COREDNS_SERVICE_PORT_UDP_53", "value": "53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP", "value": "udp://10.96.24.213:53" }, { "key": "COREDNS_COREDNS_PORT_53_UDP_ADDR", "value": "10.96.24.213" }, { "key": "COREDNS_COREDNS_PORT_53_TCP_PROTO", "value": "tcp" }, { "key": "KUBERNETES_SERVICE_PORT_HTTPS", "value": "443" }, { "key": "KUBERNETES_SERVICE_HOST", "value": "10.96.0.1" } ], "mounts": [ { "container_path": "/etc/coredns", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume", "readonly": true }, { "container_path": "/var/run/secrets/kubernetes.io/serviceaccount", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz", "readonly": true }, { "container_path": "/etc/hosts", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts" }, { "container_path": "/dev/termination-log", "host_path": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8" } ], "labels": { "io.kubernetes.container.name": "coredns", "io.kubernetes.pod.name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.pod.namespace": "cnf-default", "io.kubernetes.pod.uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "annotations": { "io.kubernetes.container.hash": "30544dd1", "io.kubernetes.container.ports": "[{\"name\":\"udp-53\",\"containerPort\":53,\"protocol\":\"UDP\"},{\"name\":\"tcp-53\",\"containerPort\":53,\"protocol\":\"TCP\"}]", "io.kubernetes.container.restartCount": "0", "io.kubernetes.container.terminationMessagePath": "/dev/termination-log", "io.kubernetes.container.terminationMessagePolicy": "File", "io.kubernetes.pod.terminationGracePeriod": "30" }, "log_path": "coredns/0.log", "linux": { "resources": { "cpu_period": 100000, "cpu_quota": 10000, "cpu_shares": 102, "memory_limit_in_bytes": 134217728, "oom_score_adj": -997, "hugepage_limits": [ { "page_size": "2MB" }, { "page_size": "1GB" } ], "memory_swap_limit_in_bytes": 134217728 }, "security_context": { "namespace_options": { "pid": 1 }, "run_as_user": {}, "masked_paths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "readonly_paths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ], "seccomp": { "profile_type": 1 } } } }, "runtimeSpec": { "ociVersion": "1.1.0", "process": { "user": { "uid": 0, "gid": 0, "additionalGids": [ 0 ] }, "args": [ "/coredns", "-conf", "/etc/coredns/Corefile" ], "env": [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "HOSTNAME=coredns-coredns-64fc886fd4-clwtn", "KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1", "COREDNS_COREDNS_SERVICE_PORT=53", "COREDNS_COREDNS_SERVICE_PORT_TCP_53=53", "COREDNS_COREDNS_PORT=udp://10.96.24.213:53", "KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443", "KUBERNETES_PORT_443_TCP_PROTO=tcp", "COREDNS_COREDNS_PORT_53_TCP_ADDR=10.96.24.213", "KUBERNETES_SERVICE_PORT=443", "KUBERNETES_PORT=tcp://10.96.0.1:443", "COREDNS_COREDNS_SERVICE_HOST=10.96.24.213", "COREDNS_COREDNS_PORT_53_UDP_PROTO=udp", "COREDNS_COREDNS_PORT_53_UDP_PORT=53", "COREDNS_COREDNS_PORT_53_TCP=tcp://10.96.24.213:53", "COREDNS_COREDNS_PORT_53_TCP_PORT=53", "KUBERNETES_PORT_443_TCP_PORT=443", "COREDNS_COREDNS_SERVICE_PORT_UDP_53=53", "COREDNS_COREDNS_PORT_53_UDP=udp://10.96.24.213:53", "COREDNS_COREDNS_PORT_53_UDP_ADDR=10.96.24.213", "COREDNS_COREDNS_PORT_53_TCP_PROTO=tcp", "KUBERNETES_SERVICE_PORT_HTTPS=443", "KUBERNETES_SERVICE_HOST=10.96.0.1" ], "cwd": "/", "capabilities": { "bounding": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "effective": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ], "permitted": [ "CAP_CHOWN", "CAP_DAC_OVERRIDE", "CAP_FSETID", "CAP_FOWNER", "CAP_MKNOD", "CAP_NET_RAW", "CAP_SETGID", "CAP_SETUID", "CAP_SETFCAP", "CAP_SETPCAP", "CAP_NET_BIND_SERVICE", "CAP_SYS_CHROOT", "CAP_KILL", "CAP_AUDIT_WRITE" ] }, "oomScoreAdj": -997 }, "root": { "path": "rootfs" }, "mounts": [ { "destination": "/proc", "type": "proc", "source": "proc", "options": [ "nosuid", "noexec", "nodev" ] }, { "destination": "/dev", "type": "tmpfs", "source": "tmpfs", "options": [ "nosuid", "strictatime", "mode=755", "size=65536k" ] }, { "destination": "/dev/pts", "type": "devpts", "source": "devpts", "options": [ "nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5" ] }, { "destination": "/dev/mqueue", "type": "mqueue", "source": "mqueue", "options": [ "nosuid", "noexec", "nodev" ] }, { "destination": "/sys", "type": "sysfs", "source": "sysfs", "options": [ "nosuid", "noexec", "nodev", "ro" ] }, { "destination": "/sys/fs/cgroup", "type": "cgroup", "source": "cgroup", "options": [ "nosuid", "noexec", "nodev", "relatime", "ro" ] }, { "destination": "/etc/coredns", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~configmap/config-volume", "options": [ "rbind", "rprivate", "ro" ] }, { "destination": "/etc/hosts", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/etc-hosts", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/dev/termination-log", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/containers/coredns/efa999c8", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/etc/hostname", "type": "bind", "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/hostname", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/etc/resolv.conf", "type": "bind", "source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/resolv.conf", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/dev/shm", "type": "bind", "source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299/shm", "options": [ "rbind", "rprivate", "rw" ] }, { "destination": "/var/run/secrets/kubernetes.io/serviceaccount", "type": "bind", "source": "/var/lib/kubelet/pods/1493bcca-c392-4f42-8125-d050b7590390/volumes/kubernetes.io~projected/kube-api-access-fkffz", "options": [ "rbind", "rprivate", "ro" ] } ], "hooks": { "createContainer": [ { "path": "/kind/bin/mount-product-files.sh" } ] }, "annotations": { "io.kubernetes.cri.container-name": "coredns", "io.kubernetes.cri.container-type": "container", "io.kubernetes.cri.image-name": "docker.io/coredns/coredns:1.7.1", "io.kubernetes.cri.sandbox-id": "87a523cbf160b7bb5851f4cfa03d44b528142d6bd48a3cdf16e4eb1d28510299", "io.kubernetes.cri.sandbox-name": "coredns-coredns-64fc886fd4-clwtn", "io.kubernetes.cri.sandbox-namespace": "cnf-default", "io.kubernetes.cri.sandbox-uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "linux": { "resources": { "devices": [ { "allow": false, "access": "rwm" } ], "memory": { "limit": 134217728, "swap": 134217728 }, "cpu": { "shares": 102, "quota": 10000, "period": 100000 } }, "cgroupsPath": "kubelet-kubepods-pod1493bcca_c392_4f42_8125_d050b7590390.slice:cri-containerd:8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "namespaces": [ { "type": "pid" }, { "type": "ipc", "path": "/proc/3113384/ns/ipc" }, { "type": "uts", "path": "/proc/3113384/ns/uts" }, { "type": "mount" }, { "type": "network", "path": "/proc/3113384/ns/net" } ], "maskedPaths": [ "/proc/asound", "/proc/acpi", "/proc/kcore", "/proc/keys", "/proc/latency_stats", "/proc/timer_list", "/proc/timer_stats", "/proc/sched_debug", "/proc/scsi", "/sys/firmware", "/sys/devices/virtual/powercap" ], "readonlyPaths": [ "/proc/bus", "/proc/fs", "/proc/irq", "/proc/sys", "/proc/sysrq-trigger" ] } } } } I, [2025-03-06 11:57:56 UTC #1422] INFO -- cnf-testsuite: node_pid_by_container_id pid: 3113417 I, [2025-03-06 11:57:56 UTC #1422] INFO -- cnf-testsuite-sig_term_handled: node pid (should never be pid 1): 3113417 I, [2025-03-06 11:57:56 UTC #1422] INFO -- cnf-testsuite-sig_term_handled: node name : v132-worker2 I, [2025-03-06 11:57:56 UTC #1422] INFO -- cnf-testsuite: pids I, [2025-03-06 11:57:56 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:56 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:56 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- ls /proc/ I, [2025-03-06 11:57:56 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- ls /proc/ D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: 1 162 1749 178 284 3111878 3111903 3111937 3111957 3112901 3112926 3112959 3113360 3113384 3113417 3115492 372 384 423 430 479 680 793 818 854 acpi bootconfig buddyinfo bus cgroups cmdline consoles cpuinfo crypto devices diskstats dma driver dynamic_debug execdomains fb filesystems fs interrupts iomem ioports irq kallsyms kcore key-users keys kmsg kpagecgroup kpagecount kpageflags loadavg locks mdstat meminfo misc modules mounts mtrr net pagetypeinfo partitions pressure schedstat scsi self slabinfo softirqs stat swaps sys sysrq-trigger sysvipc thread-self timer_list tty uptime version version_signature vmallocinfo vmstat zoneinfo D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "1\n162\n1749\n178\n284\n3111878\n3111903\n3111937\n3111957\n3112901\n3112926\n3112959\n3113360\n3113384\n3113417\n3115492\n372\n384\n423\n430\n479\n680\n793\n818\n854\nacpi\nbootconfig\nbuddyinfo\nbus\ncgroups\ncmdline\nconsoles\ncpuinfo\ncrypto\ndevices\ndiskstats\ndma\ndriver\ndynamic_debug\nexecdomains\nfb\nfilesystems\nfs\ninterrupts\niomem\nioports\nirq\nkallsyms\nkcore\nkey-users\nkeys\nkmsg\nkpagecgroup\nkpagecount\nkpageflags\nloadavg\nlocks\nmdstat\nmeminfo\nmisc\nmodules\nmounts\nmtrr\nnet\npagetypeinfo\npartitions\npressure\nschedstat\nscsi\nself\nslabinfo\nsoftirqs\nstat\nswaps\nsys\nsysrq-trigger\nsysvipc\nthread-self\ntimer_list\ntty\nuptime\nversion\nversion_signature\nvmallocinfo\nvmstat\nzoneinfo\n", error: ""} I, [2025-03-06 11:57:57 UTC #1422] INFO -- cnf-testsuite: pids ls_proc: {status: Process::Status[0], output: "1\n162\n1749\n178\n284\n3111878\n3111903\n3111937\n3111957\n3112901\n3112926\n3112959\n3113360\n3113384\n3113417\n3115492\n372\n384\n423\n430\n479\n680\n793\n818\n854\nacpi\nbootconfig\nbuddyinfo\nbus\ncgroups\ncmdline\nconsoles\ncpuinfo\ncrypto\ndevices\ndiskstats\ndma\ndriver\ndynamic_debug\nexecdomains\nfb\nfilesystems\nfs\ninterrupts\niomem\nioports\nirq\nkallsyms\nkcore\nkey-users\nkeys\nkmsg\nkpagecgroup\nkpagecount\nkpageflags\nloadavg\nlocks\nmdstat\nmeminfo\nmisc\nmodules\nmounts\nmtrr\nnet\npagetypeinfo\npartitions\npressure\nschedstat\nscsi\nself\nslabinfo\nsoftirqs\nstat\nswaps\nsys\nsysrq-trigger\nsysvipc\nthread-self\ntimer_list\ntty\nuptime\nversion\nversion_signature\nvmallocinfo\nvmstat\nzoneinfo\n", error: ""} D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: parse_ls ls: 1 162 1749 178 284 3111878 3111903 3111937 3111957 3112901 3112926 3112959 3113360 3113384 3113417 3115492 372 384 423 430 479 680 793 818 854 acpi bootconfig buddyinfo bus cgroups cmdline consoles cpuinfo crypto devices diskstats dma driver dynamic_debug execdomains fb filesystems fs interrupts iomem ioports irq kallsyms kcore key-users keys kmsg kpagecgroup kpagecount kpageflags loadavg locks mdstat meminfo misc modules mounts mtrr net pagetypeinfo partitions pressure schedstat scsi self slabinfo softirqs stat swaps sys sysrq-trigger sysvipc thread-self timer_list tty uptime version version_signature vmallocinfo vmstat zoneinfo D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: parse_ls parsed: ["1", "162", "1749", "178", "284", "3111878", "3111903", "3111937", "3111957", "3112901", "3112926", "3112959", "3113360", "3113384", "3113417", "3115492", "372", "384", "423", "430", "479", "680", "793", "818", "854", "acpi", "bootconfig", "buddyinfo", "bus", "cgroups", "cmdline", "consoles", "cpuinfo", "crypto", "devices", "diskstats", "dma", "driver", "dynamic_debug", "execdomains", "fb", "filesystems", "fs", "interrupts", "iomem", "ioports", "irq", "kallsyms", "kcore", "key-users", "keys", "kmsg", "kpagecgroup", "kpagecount", "kpageflags", "loadavg", "locks", "mdstat", "meminfo", "misc", "modules", "mounts", "mtrr", "net", "pagetypeinfo", "partitions", "pressure", "schedstat", "scsi", "self", "slabinfo", "softirqs", "stat", "swaps", "sys", "sysrq-trigger", "sysvipc", "thread-self", "timer_list", "tty", "uptime", "version", "version_signature", "vmallocinfo", "vmstat", "zoneinfo"] D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: pids_from_ls_proc ls: ["1", "162", "1749", "178", "284", "3111878", "3111903", "3111937", "3111957", "3112901", "3112926", "3112959", "3113360", "3113384", "3113417", "3115492", "372", "384", "423", "430", "479", "680", "793", "818", "854", "acpi", "bootconfig", "buddyinfo", "bus", "cgroups", "cmdline", "consoles", "cpuinfo", "crypto", "devices", "diskstats", "dma", "driver", "dynamic_debug", "execdomains", "fb", "filesystems", "fs", "interrupts", "iomem", "ioports", "irq", "kallsyms", "kcore", "key-users", "keys", "kmsg", "kpagecgroup", "kpagecount", "kpageflags", "loadavg", "locks", "mdstat", "meminfo", "misc", "modules", "mounts", "mtrr", "net", "pagetypeinfo", "partitions", "pressure", "schedstat", "scsi", "self", "slabinfo", "softirqs", "stat", "swaps", "sys", "sysrq-trigger", "sysvipc", "thread-self", "timer_list", "tty", "uptime", "version", "version_signature", "vmallocinfo", "vmstat", "zoneinfo"] D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: pids_from_ls_proc pids: ["1", "162", "1749", "178", "284", "3111878", "3111903", "3111937", "3111957", "3112901", "3112926", "3112959", "3113360", "3113384", "3113417", "3115492", "372", "384", "423", "430", "479", "680", "793", "818", "854"] I, [2025-03-06 11:57:57 UTC #1422] INFO -- cnf-testsuite-sig_term_handled: proctree_by_pid pids: ["1", "162", "1749", "178", "284", "3111878", "3111903", "3111937", "3111957", "3112901", "3112926", "3112959", "3113360", "3113384", "3113417", "3115492", "372", "384", "423", "430", "479", "680", "793", "818", "854"] I, [2025-03-06 11:57:57 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids I, [2025-03-06 11:57:57 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 1 I, [2025-03-06 11:57:57 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:57 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/1/status I, [2025-03-06 11:57:57 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/1/status D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: systemd Umask: 0000 State: S (sleeping) Tgid: 1 Ngid: 0 Pid: 1 PPid: 0 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 256 Groups: NStgid: 1 NSpid: 1 NSpgid: 1 NSsid: 1 VmPeak: 35920 kB VmSize: 35800 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 25920 kB VmRSS: 25332 kB RssAnon: 18052 kB RssFile: 7280 kB RssShmem: 0 kB VmData: 16892 kB VmStk: 1040 kB VmExe: 40 kB VmLib: 10680 kB VmPTE: 112 kB VmSwap: 672 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 7fe3c0fe28014a03 SigIgn: 0000000000001000 SigCgt: 00000000000004ec CapInh: 0000003fffffffff CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 854445 nonvoluntary_ctxt_switches: 37992 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsystemd\nUmask:\t0000\nState:\tS (sleeping)\nTgid:\t1\nNgid:\t0\nPid:\t1\nPPid:\t0\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t256\nGroups:\t \nNStgid:\t1\nNSpid:\t1\nNSpgid:\t1\nNSsid:\t1\nVmPeak:\t 35920 kB\nVmSize:\t 35800 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 25920 kB\nVmRSS:\t 25332 kB\nRssAnon:\t 18052 kB\nRssFile:\t 7280 kB\nRssShmem:\t 0 kB\nVmData:\t 16892 kB\nVmStk:\t 1040 kB\nVmExe:\t 40 kB\nVmLib:\t 10680 kB\nVmPTE:\t 112 kB\nVmSwap:\t 672 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t7fe3c0fe28014a03\nSigIgn:\t0000000000001000\nSigCgt:\t00000000000004ec\nCapInh:\t0000003fffffffff\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t854445\nnonvoluntary_ctxt_switches:\t37992\n", error: ""} I, [2025-03-06 11:57:57 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 162 I, [2025-03-06 11:57:57 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:57 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:57 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/162/status I, [2025-03-06 11:57:57 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/162/status D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: systemd-journal Umask: 0022 State: S (sleeping) Tgid: 162 Ngid: 104252 Pid: 162 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 162 NSpid: 162 NSpgid: 162 NSsid: 162 VmPeak: 426936 kB VmSize: 348768 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 283184 kB VmRSS: 221268 kB RssAnon: 540 kB RssFile: 5680 kB RssShmem: 215048 kB VmData: 8968 kB VmStk: 132 kB VmExe: 92 kB VmLib: 9728 kB VmPTE: 580 kB VmSwap: 636 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000400004a02 SigIgn: 0000000000001000 SigCgt: 0000000100000040 CapInh: 0000000000000000 CapPrm: 00000025402800cf CapEff: 00000025402800cf CapBnd: 00000025402800cf CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 20 Speculation_Store_Bypass: thread force mitigated SpeculationIndirectBranch: conditional force disabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 528566 nonvoluntary_ctxt_switches: 1495 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsystemd-journal\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t162\nNgid:\t104252\nPid:\t162\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t162\nNSpid:\t162\nNSpgid:\t162\nNSsid:\t162\nVmPeak:\t 426936 kB\nVmSize:\t 348768 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 283184 kB\nVmRSS:\t 221268 kB\nRssAnon:\t 540 kB\nRssFile:\t 5680 kB\nRssShmem:\t 215048 kB\nVmData:\t 8968 kB\nVmStk:\t 132 kB\nVmExe:\t 92 kB\nVmLib:\t 9728 kB\nVmPTE:\t 580 kB\nVmSwap:\t 636 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000400004a02\nSigIgn:\t0000000000001000\nSigCgt:\t0000000100000040\nCapInh:\t0000000000000000\nCapPrm:\t00000025402800cf\nCapEff:\t00000025402800cf\nCapBnd:\t00000025402800cf\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t20\nSpeculation_Store_Bypass:\tthread force mitigated\nSpeculationIndirectBranch:\tconditional force disabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t528566\nnonvoluntary_ctxt_switches:\t1495\n", error: ""} I, [2025-03-06 11:57:58 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 1749 I, [2025-03-06 11:57:58 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:58 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/1749/status I, [2025-03-06 11:57:58 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/1749/status D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: sleep Umask: 0022 State: S (sleeping) Tgid: 1749 Ngid: 0 Pid: 1749 PPid: 854 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 1 2 3 4 6 10 11 20 26 27 NStgid: 1749 888 NSpid: 1749 888 NSpgid: 854 1 NSsid: 854 1 VmPeak: 3552 kB VmSize: 1532 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 20 kB VmStk: 132 kB VmExe: 788 kB VmLib: 556 kB VmPTE: 40 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000000000 CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 1 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t1749\nNgid:\t0\nPid:\t1749\nPPid:\t854\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t1749\t888\nNSpid:\t1749\t888\nNSpgid:\t854\t1\nNSsid:\t854\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1532 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 20 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 40 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1\nnonvoluntary_ctxt_switches:\t0\n", error: ""} I, [2025-03-06 11:57:58 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 178 I, [2025-03-06 11:57:58 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:58 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/178/status I, [2025-03-06 11:57:58 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/178/status D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: containerd Umask: 0022 State: S (sleeping) Tgid: 178 Ngid: 0 Pid: 178 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 2048 Groups: NStgid: 178 NSpid: 178 NSpgid: 178 NSsid: 178 VmPeak: 7722728 kB VmSize: 7428472 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 134104 kB VmRSS: 86524 kB RssAnon: 61872 kB RssFile: 24652 kB RssShmem: 0 kB VmData: 650428 kB VmStk: 132 kB VmExe: 19352 kB VmLib: 1520 kB VmPTE: 1132 kB VmSwap: 1028 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 58 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 169 nonvoluntary_ctxt_switches: 1 D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t178\nNgid:\t0\nPid:\t178\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t2048\nGroups:\t \nNStgid:\t178\nNSpid:\t178\nNSpgid:\t178\nNSsid:\t178\nVmPeak:\t 7722728 kB\nVmSize:\t 7428472 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 134104 kB\nVmRSS:\t 86524 kB\nRssAnon:\t 61872 kB\nRssFile:\t 24652 kB\nRssShmem:\t 0 kB\nVmData:\t 650428 kB\nVmStk:\t 132 kB\nVmExe:\t 19352 kB\nVmLib:\t 1520 kB\nVmPTE:\t 1132 kB\nVmSwap:\t 1028 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t58\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t169\nnonvoluntary_ctxt_switches:\t1\n", error: ""} I, [2025-03-06 11:57:58 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 284 I, [2025-03-06 11:57:58 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:58 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:58 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/284/status I, [2025-03-06 11:57:59 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/284/status D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: kubelet Umask: 0022 State: S (sleeping) Tgid: 284 Ngid: 114779 Pid: 284 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 256 Groups: NStgid: 284 NSpid: 284 NSpgid: 284 NSsid: 284 VmPeak: 8474868 kB VmSize: 8474868 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 126788 kB VmRSS: 113812 kB RssAnon: 82868 kB RssFile: 30944 kB RssShmem: 0 kB VmData: 962580 kB VmStk: 132 kB VmExe: 35216 kB VmLib: 1556 kB VmPTE: 1284 kB VmSwap: 1864 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 97 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 5932761 nonvoluntary_ctxt_switches: 7048 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tkubelet\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t284\nNgid:\t114779\nPid:\t284\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t256\nGroups:\t \nNStgid:\t284\nNSpid:\t284\nNSpgid:\t284\nNSsid:\t284\nVmPeak:\t 8474868 kB\nVmSize:\t 8474868 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 126788 kB\nVmRSS:\t 113812 kB\nRssAnon:\t 82868 kB\nRssFile:\t 30944 kB\nRssShmem:\t 0 kB\nVmData:\t 962580 kB\nVmStk:\t 132 kB\nVmExe:\t 35216 kB\nVmLib:\t 1556 kB\nVmPTE:\t 1284 kB\nVmSwap:\t 1864 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t97\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t5932761\nnonvoluntary_ctxt_switches:\t7048\n", error: ""} I, [2025-03-06 11:57:59 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3111878 I, [2025-03-06 11:57:59 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:59 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3111878/status I, [2025-03-06 11:57:59 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3111878/status D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 3111878 Ngid: 0 Pid: 3111878 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 3111878 NSpid: 3111878 NSpgid: 3111878 NSsid: 178 VmPeak: 1238568 kB VmSize: 1238568 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 16236 kB VmRSS: 16140 kB RssAnon: 5012 kB RssFile: 11128 kB RssShmem: 0 kB VmData: 45580 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 120 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 12 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 82 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111878\nNgid:\t0\nPid:\t3111878\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t3111878\nNSpid:\t3111878\nNSpgid:\t3111878\nNSsid:\t178\nVmPeak:\t 1238568 kB\nVmSize:\t 1238568 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 16236 kB\nVmRSS:\t 16140 kB\nRssAnon:\t 5012 kB\nRssFile:\t 11128 kB\nRssShmem:\t 0 kB\nVmData:\t 45580 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 120 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t82\nnonvoluntary_ctxt_switches:\t0\n", error: ""} I, [2025-03-06 11:57:59 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3111903 I, [2025-03-06 11:57:59 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:57:59 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:57:59 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3111903/status I, [2025-03-06 11:58:00 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3111903/status D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 3111903 Ngid: 0 Pid: 3111903 PPid: 3111878 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 3111903 NSpid: 3111903 NSpgid: 3111903 NSsid: 3111903 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 41 nonvoluntary_ctxt_switches: 7 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111903\nNgid:\t0\nPid:\t3111903\nPPid:\t3111878\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t3111903\nNSpid:\t3111903\nNSpgid:\t3111903\nNSsid:\t3111903\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t41\nnonvoluntary_ctxt_switches:\t7\n", error: ""} I, [2025-03-06 11:58:00 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3111937 I, [2025-03-06 11:58:00 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:58:00 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3111937/status I, [2025-03-06 11:58:00 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3111937/status D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: sh Umask: 0022 State: S (sleeping) Tgid: 3111937 Ngid: 0 Pid: 3111937 PPid: 3111878 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 3111937 NSpid: 3111937 NSpgid: 3111937 NSsid: 3111937 VmPeak: 2576 kB VmSize: 2576 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 928 kB VmRSS: 928 kB RssAnon: 88 kB RssFile: 840 kB RssShmem: 0 kB VmData: 232 kB VmStk: 132 kB VmExe: 76 kB VmLib: 1520 kB VmPTE: 44 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000010002 CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 61 nonvoluntary_ctxt_switches: 8 D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsh\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111937\nNgid:\t0\nPid:\t3111937\nPPid:\t3111878\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t3111937\nNSpid:\t3111937\nNSpgid:\t3111937\nNSsid:\t3111937\nVmPeak:\t 2576 kB\nVmSize:\t 2576 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 928 kB\nVmRSS:\t 928 kB\nRssAnon:\t 88 kB\nRssFile:\t 840 kB\nRssShmem:\t 0 kB\nVmData:\t 232 kB\nVmStk:\t 132 kB\nVmExe:\t 76 kB\nVmLib:\t 1520 kB\nVmPTE:\t 44 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000010002\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t61\nnonvoluntary_ctxt_switches:\t8\n", error: ""} I, [2025-03-06 11:58:00 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3111957 I, [2025-03-06 11:58:00 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:58:00 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:58:00 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3111957/status I, [2025-03-06 11:58:01 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3111957/status D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: sleep Umask: 0022 State: S (sleeping) Tgid: 3111957 Ngid: 0 Pid: 3111957 PPid: 3111937 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 3111957 NSpid: 3111957 NSpgid: 3111937 NSsid: 3111937 VmPeak: 2484 kB VmSize: 2484 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 904 kB VmRSS: 904 kB RssAnon: 88 kB RssFile: 816 kB RssShmem: 0 kB VmData: 224 kB VmStk: 132 kB VmExe: 20 kB VmLib: 1520 kB VmPTE: 40 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000000000 CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 4 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111957\nNgid:\t0\nPid:\t3111957\nPPid:\t3111937\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t3111957\nNSpid:\t3111957\nNSpgid:\t3111937\nNSsid:\t3111937\nVmPeak:\t 2484 kB\nVmSize:\t 2484 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 904 kB\nVmRSS:\t 904 kB\nRssAnon:\t 88 kB\nRssFile:\t 816 kB\nRssShmem:\t 0 kB\nVmData:\t 224 kB\nVmStk:\t 132 kB\nVmExe:\t 20 kB\nVmLib:\t 1520 kB\nVmPTE:\t 40 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t4\nnonvoluntary_ctxt_switches:\t0\n", error: ""} I, [2025-03-06 11:58:01 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3112901 I, [2025-03-06 11:58:01 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:58:01 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3112901/status I, [2025-03-06 11:58:01 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3112901/status D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 3112901 Ngid: 0 Pid: 3112901 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 3112901 NSpid: 3112901 NSpgid: 3112901 NSsid: 178 VmPeak: 1238312 kB VmSize: 1238312 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 14684 kB VmRSS: 14612 kB RssAnon: 3760 kB RssFile: 10852 kB RssShmem: 0 kB VmData: 45324 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 116 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 11 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 9 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3112901\nNgid:\t0\nPid:\t3112901\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t3112901\nNSpid:\t3112901\nNSpgid:\t3112901\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 14684 kB\nVmRSS:\t 14612 kB\nRssAnon:\t 3760 kB\nRssFile:\t 10852 kB\nRssShmem:\t 0 kB\nVmData:\t 45324 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 116 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t11\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", error: ""} I, [2025-03-06 11:58:01 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3112926 I, [2025-03-06 11:58:01 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:58:01 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:58:01 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3112926/status I, [2025-03-06 11:58:02 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3112926/status D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 3112926 Ngid: 0 Pid: 3112926 PPid: 3112901 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 3112926 1 NSpid: 3112926 1 NSpgid: 3112926 1 NSsid: 3112926 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 29 nonvoluntary_ctxt_switches: 9 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3112926\nNgid:\t0\nPid:\t3112926\nPPid:\t3112901\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t3112926\t1\nNSpid:\t3112926\t1\nNSpgid:\t3112926\t1\nNSsid:\t3112926\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t29\nnonvoluntary_ctxt_switches:\t9\n", error: ""} I, [2025-03-06 11:58:02 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3112959 I, [2025-03-06 11:58:02 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:58:02 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3112959/status I, [2025-03-06 11:58:02 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3112959/status D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: chaos-operator Umask: 0022 State: S (sleeping) Tgid: 3112959 Ngid: 0 Pid: 3112959 PPid: 3112901 TracerPid: 0 Uid: 1000 1000 1000 1000 Gid: 1000 1000 1000 1000 FDSize: 64 Groups: 1000 NStgid: 3112959 1 NSpid: 3112959 1 NSpgid: 3112959 1 NSsid: 3112959 1 VmPeak: 1262700 kB VmSize: 1262700 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 38888 kB VmRSS: 38888 kB RssAnon: 15496 kB RssFile: 23392 kB RssShmem: 0 kB VmData: 63428 kB VmStk: 132 kB VmExe: 15232 kB VmLib: 8 kB VmPTE: 200 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 35 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 1336 nonvoluntary_ctxt_switches: 11 D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tchaos-operator\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3112959\nNgid:\t0\nPid:\t3112959\nPPid:\t3112901\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t1000\t1000\t1000\t1000\nFDSize:\t64\nGroups:\t1000 \nNStgid:\t3112959\t1\nNSpid:\t3112959\t1\nNSpgid:\t3112959\t1\nNSsid:\t3112959\t1\nVmPeak:\t 1262700 kB\nVmSize:\t 1262700 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 38888 kB\nVmRSS:\t 38888 kB\nRssAnon:\t 15496 kB\nRssFile:\t 23392 kB\nRssShmem:\t 0 kB\nVmData:\t 63428 kB\nVmStk:\t 132 kB\nVmExe:\t 15232 kB\nVmLib:\t 8 kB\nVmPTE:\t 200 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t35\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1336\nnonvoluntary_ctxt_switches:\t11\n", error: ""} I, [2025-03-06 11:58:02 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3113360 I, [2025-03-06 11:58:02 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:58:02 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:58:02 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3113360/status I, [2025-03-06 11:58:03 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3113360/status D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 3113360 Ngid: 0 Pid: 3113360 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 3113360 NSpid: 3113360 NSpgid: 3113360 NSsid: 178 VmPeak: 1238312 kB VmSize: 1238312 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 13976 kB VmRSS: 13916 kB RssAnon: 3484 kB RssFile: 10432 kB RssShmem: 0 kB VmData: 41228 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 112 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 11 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 8 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3113360\nNgid:\t0\nPid:\t3113360\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t3113360\nNSpid:\t3113360\nNSpgid:\t3113360\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 13976 kB\nVmRSS:\t 13916 kB\nRssAnon:\t 3484 kB\nRssFile:\t 10432 kB\nRssShmem:\t 0 kB\nVmData:\t 41228 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 112 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t11\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", error: ""} I, [2025-03-06 11:58:03 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3113384 I, [2025-03-06 11:58:03 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:58:03 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3113384/status I, [2025-03-06 11:58:03 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3113384/status D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 3113384 Ngid: 0 Pid: 3113384 PPid: 3113360 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 3113384 1 NSpid: 3113384 1 NSpgid: 3113384 1 NSsid: 3113384 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 24 nonvoluntary_ctxt_switches: 13 D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3113384\nNgid:\t0\nPid:\t3113384\nPPid:\t3113360\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t3113384\t1\nNSpid:\t3113384\t1\nNSpgid:\t3113384\t1\nNSsid:\t3113384\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t24\nnonvoluntary_ctxt_switches:\t13\n", error: ""} I, [2025-03-06 11:58:03 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3113417 I, [2025-03-06 11:58:03 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:58:03 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:58:03 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3113417/status I, [2025-03-06 11:58:04 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3113417/status D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: coredns Umask: 0022 State: S (sleeping) Tgid: 3113417 Ngid: 0 Pid: 3113417 PPid: 3113360 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 3113417 1 NSpid: 3113417 1 NSpgid: 3113417 1 NSsid: 3113417 1 VmPeak: 748492 kB VmSize: 748492 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 41412 kB VmRSS: 41412 kB RssAnon: 12648 kB RssFile: 28764 kB RssShmem: 0 kB VmData: 108680 kB VmStk: 132 kB VmExe: 22032 kB VmLib: 8 kB VmPTE: 200 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 22 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffe7fc1feff CapInh: 0000000000000000 CapPrm: 00000000a80425fb CapEff: 00000000a80425fb CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 960 nonvoluntary_ctxt_switches: 15 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcoredns\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3113417\nNgid:\t0\nPid:\t3113417\nPPid:\t3113360\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t3113417\t1\nNSpid:\t3113417\t1\nNSpgid:\t3113417\t1\nNSsid:\t3113417\t1\nVmPeak:\t 748492 kB\nVmSize:\t 748492 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 41412 kB\nVmRSS:\t 41412 kB\nRssAnon:\t 12648 kB\nRssFile:\t 28764 kB\nRssShmem:\t 0 kB\nVmData:\t 108680 kB\nVmStk:\t 132 kB\nVmExe:\t 22032 kB\nVmLib:\t 8 kB\nVmPTE:\t 200 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t22\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffe7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80425fb\nCapEff:\t00000000a80425fb\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t960\nnonvoluntary_ctxt_switches:\t15\n", error: ""} I, [2025-03-06 11:58:04 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 3115492 I, [2025-03-06 11:58:04 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:58:04 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3115492/status I, [2025-03-06 11:58:04 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3115492/status D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: I, [2025-03-06 11:58:04 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec stderr: cat: /proc/3115492/status: No such file or directory command terminated with exit code 1 D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[1], output: "", error: "cat: /proc/3115492/status: No such file or directory\ncommand terminated with exit code 1\n"} I, [2025-03-06 11:58:04 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 372 I, [2025-03-06 11:58:04 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:58:04 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:58:04 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/372/status I, [2025-03-06 11:58:05 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/372/status D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 372 Ngid: 0 Pid: 372 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 372 NSpid: 372 NSpgid: 372 NSsid: 178 VmPeak: 1238312 kB VmSize: 1238312 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 14124 kB VmRSS: 12968 kB RssAnon: 2676 kB RssFile: 10292 kB RssShmem: 0 kB VmData: 41228 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 116 kB VmSwap: 612 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 13 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 9 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t372\nNgid:\t0\nPid:\t372\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t372\nNSpid:\t372\nNSpgid:\t372\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 14124 kB\nVmRSS:\t 12968 kB\nRssAnon:\t 2676 kB\nRssFile:\t 10292 kB\nRssShmem:\t 0 kB\nVmData:\t 41228 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 116 kB\nVmSwap:\t 612 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", error: ""} I, [2025-03-06 11:58:05 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 384 I, [2025-03-06 11:58:05 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:58:05 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/384/status I, [2025-03-06 11:58:05 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/384/status D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 384 Ngid: 0 Pid: 384 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 384 NSpid: 384 NSpgid: 384 NSsid: 178 VmPeak: 1238312 kB VmSize: 1238312 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 14288 kB VmRSS: 13628 kB RssAnon: 3176 kB RssFile: 10452 kB RssShmem: 0 kB VmData: 45324 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 120 kB VmSwap: 504 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 13 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 8 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t384\nNgid:\t0\nPid:\t384\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t384\nNSpid:\t384\nNSpgid:\t384\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 14288 kB\nVmRSS:\t 13628 kB\nRssAnon:\t 3176 kB\nRssFile:\t 10452 kB\nRssShmem:\t 0 kB\nVmData:\t 45324 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 120 kB\nVmSwap:\t 504 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", error: ""} I, [2025-03-06 11:58:05 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 423 I, [2025-03-06 11:58:05 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:58:05 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:58:05 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/423/status I, [2025-03-06 11:58:06 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/423/status D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 423 Ngid: 0 Pid: 423 PPid: 372 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 423 1 NSpid: 423 1 NSpgid: 423 1 NSsid: 423 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 34 nonvoluntary_ctxt_switches: 8 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t423\nNgid:\t0\nPid:\t423\nPPid:\t372\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t423\t1\nNSpid:\t423\t1\nNSpgid:\t423\t1\nNSsid:\t423\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t34\nnonvoluntary_ctxt_switches:\t8\n", error: ""} I, [2025-03-06 11:58:06 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 430 I, [2025-03-06 11:58:06 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:58:06 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/430/status I, [2025-03-06 11:58:06 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/430/status D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 430 Ngid: 0 Pid: 430 PPid: 384 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 430 1 NSpid: 430 1 NSpgid: 430 1 NSsid: 430 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 24 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 35 nonvoluntary_ctxt_switches: 11 D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t430\nNgid:\t0\nPid:\t430\nPPid:\t384\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t430\t1\nNSpid:\t430\t1\nNSpgid:\t430\t1\nNSsid:\t430\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 24 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t35\nnonvoluntary_ctxt_switches:\t11\n", error: ""} I, [2025-03-06 11:58:06 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 479 I, [2025-03-06 11:58:06 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:58:06 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:58:06 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/479/status I, [2025-03-06 11:58:07 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/479/status D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: kube-proxy Umask: 0022 State: S (sleeping) Tgid: 479 Ngid: 331610 Pid: 479 PPid: 372 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 479 1 NSpid: 479 1 NSpgid: 479 1 NSsid: 479 1 VmPeak: 1299688 kB VmSize: 1299688 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 56656 kB VmRSS: 32208 kB RssAnon: 16404 kB RssFile: 15804 kB RssShmem: 0 kB VmData: 78976 kB VmStk: 132 kB VmExe: 30348 kB VmLib: 8 kB VmPTE: 288 kB VmSwap: 472 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 38 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 96966 nonvoluntary_ctxt_switches: 133 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tkube-proxy\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t479\nNgid:\t331610\nPid:\t479\nPPid:\t372\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t479\t1\nNSpid:\t479\t1\nNSpgid:\t479\t1\nNSsid:\t479\t1\nVmPeak:\t 1299688 kB\nVmSize:\t 1299688 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 56656 kB\nVmRSS:\t 32208 kB\nRssAnon:\t 16404 kB\nRssFile:\t 15804 kB\nRssShmem:\t 0 kB\nVmData:\t 78976 kB\nVmStk:\t 132 kB\nVmExe:\t 30348 kB\nVmLib:\t 8 kB\nVmPTE:\t 288 kB\nVmSwap:\t 472 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t38\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t96966\nnonvoluntary_ctxt_switches:\t133\n", error: ""} I, [2025-03-06 11:58:07 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 680 I, [2025-03-06 11:58:07 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:58:07 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/680/status I, [2025-03-06 11:58:07 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/680/status D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: kindnetd Umask: 0022 State: S (sleeping) Tgid: 680 Ngid: 117220 Pid: 680 PPid: 384 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 680 1 NSpid: 680 1 NSpgid: 680 1 NSsid: 680 1 VmPeak: 1276212 kB VmSize: 1276212 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 40068 kB VmRSS: 23992 kB RssAnon: 13368 kB RssFile: 10624 kB RssShmem: 0 kB VmData: 67572 kB VmStk: 132 kB VmExe: 21148 kB VmLib: 8 kB VmPTE: 248 kB VmSwap: 232 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 41 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba3a00 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 00000000a80435fb CapEff: 00000000a80435fb CapBnd: 00000000a80435fb CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 1091 nonvoluntary_ctxt_switches: 18 D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tkindnetd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t680\nNgid:\t117220\nPid:\t680\nPPid:\t384\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t680\t1\nNSpid:\t680\t1\nNSpgid:\t680\t1\nNSsid:\t680\t1\nVmPeak:\t 1276212 kB\nVmSize:\t 1276212 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 40068 kB\nVmRSS:\t 23992 kB\nRssAnon:\t 13368 kB\nRssFile:\t 10624 kB\nRssShmem:\t 0 kB\nVmData:\t 67572 kB\nVmStk:\t 132 kB\nVmExe:\t 21148 kB\nVmLib:\t 8 kB\nVmPTE:\t 248 kB\nVmSwap:\t 232 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t41\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80435fb\nCapEff:\t00000000a80435fb\nCapBnd:\t00000000a80435fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1091\nnonvoluntary_ctxt_switches:\t18\n", error: ""} I, [2025-03-06 11:58:07 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 793 I, [2025-03-06 11:58:07 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:58:07 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:58:07 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/793/status I, [2025-03-06 11:58:08 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/793/status D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 793 Ngid: 0 Pid: 793 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 793 NSpid: 793 NSpgid: 793 NSsid: 178 VmPeak: 1238312 kB VmSize: 1238312 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 15024 kB VmRSS: 14408 kB RssAnon: 3488 kB RssFile: 10920 kB RssShmem: 0 kB VmData: 45324 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 124 kB VmSwap: 88 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 13 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 9 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t793\nNgid:\t0\nPid:\t793\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t793\nNSpid:\t793\nNSpgid:\t793\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 15024 kB\nVmRSS:\t 14408 kB\nRssAnon:\t 3488 kB\nRssFile:\t 10920 kB\nRssShmem:\t 0 kB\nVmData:\t 45324 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 124 kB\nVmSwap:\t 88 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", error: ""} I, [2025-03-06 11:58:08 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 818 I, [2025-03-06 11:58:08 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:58:08 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/818/status I, [2025-03-06 11:58:08 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/818/status D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 818 Ngid: 0 Pid: 818 PPid: 793 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 818 1 NSpid: 818 1 NSpgid: 818 1 NSsid: 818 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 24 nonvoluntary_ctxt_switches: 7 D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t818\nNgid:\t0\nPid:\t818\nPPid:\t793\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t818\t1\nNSpid:\t818\t1\nNSpgid:\t818\t1\nNSsid:\t818\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t24\nnonvoluntary_ctxt_switches:\t7\n", error: ""} I, [2025-03-06 11:58:08 UTC #1422] INFO -- cnf-testsuite: all_statuses_by_pids pid: 854 I, [2025-03-06 11:58:08 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:58:08 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:58:08 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/854/status I, [2025-03-06 11:58:09 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/854/status D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: Name: sh Umask: 0022 State: S (sleeping) Tgid: 854 Ngid: 0 Pid: 854 PPid: 793 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 1 2 3 4 6 10 11 20 26 27 NStgid: 854 1 NSpid: 854 1 NSpgid: 854 1 NSsid: 854 1 VmPeak: 3552 kB VmSize: 1564 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 972 kB VmRSS: 84 kB RssAnon: 80 kB RssFile: 4 kB RssShmem: 0 kB VmData: 52 kB VmStk: 132 kB VmExe: 788 kB VmLib: 556 kB VmPTE: 44 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000004 SigCgt: 0000000000010002 CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 906 nonvoluntary_ctxt_switches: 9 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "Name:\tsh\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t854\nNgid:\t0\nPid:\t854\nPPid:\t793\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t854\t1\nNSpid:\t854\t1\nNSpgid:\t854\t1\nNSsid:\t854\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1564 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 972 kB\nVmRSS:\t 84 kB\nRssAnon:\t 80 kB\nRssFile:\t 4 kB\nRssShmem:\t 0 kB\nVmData:\t 52 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 44 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000004\nSigCgt:\t0000000000010002\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t906\nnonvoluntary_ctxt_switches:\t9\n", error: ""} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: proc process_statuses_by_node: ["Name:\tsystemd\nUmask:\t0000\nState:\tS (sleeping)\nTgid:\t1\nNgid:\t0\nPid:\t1\nPPid:\t0\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t256\nGroups:\t \nNStgid:\t1\nNSpid:\t1\nNSpgid:\t1\nNSsid:\t1\nVmPeak:\t 35920 kB\nVmSize:\t 35800 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 25920 kB\nVmRSS:\t 25332 kB\nRssAnon:\t 18052 kB\nRssFile:\t 7280 kB\nRssShmem:\t 0 kB\nVmData:\t 16892 kB\nVmStk:\t 1040 kB\nVmExe:\t 40 kB\nVmLib:\t 10680 kB\nVmPTE:\t 112 kB\nVmSwap:\t 672 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t7fe3c0fe28014a03\nSigIgn:\t0000000000001000\nSigCgt:\t00000000000004ec\nCapInh:\t0000003fffffffff\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t854445\nnonvoluntary_ctxt_switches:\t37992\n", "Name:\tsystemd-journal\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t162\nNgid:\t104252\nPid:\t162\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t162\nNSpid:\t162\nNSpgid:\t162\nNSsid:\t162\nVmPeak:\t 426936 kB\nVmSize:\t 348768 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 283184 kB\nVmRSS:\t 221268 kB\nRssAnon:\t 540 kB\nRssFile:\t 5680 kB\nRssShmem:\t 215048 kB\nVmData:\t 8968 kB\nVmStk:\t 132 kB\nVmExe:\t 92 kB\nVmLib:\t 9728 kB\nVmPTE:\t 580 kB\nVmSwap:\t 636 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000400004a02\nSigIgn:\t0000000000001000\nSigCgt:\t0000000100000040\nCapInh:\t0000000000000000\nCapPrm:\t00000025402800cf\nCapEff:\t00000025402800cf\nCapBnd:\t00000025402800cf\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t20\nSpeculation_Store_Bypass:\tthread force mitigated\nSpeculationIndirectBranch:\tconditional force disabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t528566\nnonvoluntary_ctxt_switches:\t1495\n", "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t1749\nNgid:\t0\nPid:\t1749\nPPid:\t854\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t1749\t888\nNSpid:\t1749\t888\nNSpgid:\t854\t1\nNSsid:\t854\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1532 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 20 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 40 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tcontainerd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t178\nNgid:\t0\nPid:\t178\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t2048\nGroups:\t \nNStgid:\t178\nNSpid:\t178\nNSpgid:\t178\nNSsid:\t178\nVmPeak:\t 7722728 kB\nVmSize:\t 7428472 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 134104 kB\nVmRSS:\t 86524 kB\nRssAnon:\t 61872 kB\nRssFile:\t 24652 kB\nRssShmem:\t 0 kB\nVmData:\t 650428 kB\nVmStk:\t 132 kB\nVmExe:\t 19352 kB\nVmLib:\t 1520 kB\nVmPTE:\t 1132 kB\nVmSwap:\t 1028 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t58\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t169\nnonvoluntary_ctxt_switches:\t1\n", "Name:\tkubelet\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t284\nNgid:\t114779\nPid:\t284\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t256\nGroups:\t \nNStgid:\t284\nNSpid:\t284\nNSpgid:\t284\nNSsid:\t284\nVmPeak:\t 8474868 kB\nVmSize:\t 8474868 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 126788 kB\nVmRSS:\t 113812 kB\nRssAnon:\t 82868 kB\nRssFile:\t 30944 kB\nRssShmem:\t 0 kB\nVmData:\t 962580 kB\nVmStk:\t 132 kB\nVmExe:\t 35216 kB\nVmLib:\t 1556 kB\nVmPTE:\t 1284 kB\nVmSwap:\t 1864 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t97\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t5932761\nnonvoluntary_ctxt_switches:\t7048\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111878\nNgid:\t0\nPid:\t3111878\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t3111878\nNSpid:\t3111878\nNSpgid:\t3111878\nNSsid:\t178\nVmPeak:\t 1238568 kB\nVmSize:\t 1238568 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 16236 kB\nVmRSS:\t 16140 kB\nRssAnon:\t 5012 kB\nRssFile:\t 11128 kB\nRssShmem:\t 0 kB\nVmData:\t 45580 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 120 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t82\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111903\nNgid:\t0\nPid:\t3111903\nPPid:\t3111878\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t3111903\nNSpid:\t3111903\nNSpgid:\t3111903\nNSsid:\t3111903\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t41\nnonvoluntary_ctxt_switches:\t7\n", "Name:\tsh\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111937\nNgid:\t0\nPid:\t3111937\nPPid:\t3111878\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t3111937\nNSpid:\t3111937\nNSpgid:\t3111937\nNSsid:\t3111937\nVmPeak:\t 2576 kB\nVmSize:\t 2576 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 928 kB\nVmRSS:\t 928 kB\nRssAnon:\t 88 kB\nRssFile:\t 840 kB\nRssShmem:\t 0 kB\nVmData:\t 232 kB\nVmStk:\t 132 kB\nVmExe:\t 76 kB\nVmLib:\t 1520 kB\nVmPTE:\t 44 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000010002\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t61\nnonvoluntary_ctxt_switches:\t8\n", "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111957\nNgid:\t0\nPid:\t3111957\nPPid:\t3111937\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t3111957\nNSpid:\t3111957\nNSpgid:\t3111937\nNSsid:\t3111937\nVmPeak:\t 2484 kB\nVmSize:\t 2484 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 904 kB\nVmRSS:\t 904 kB\nRssAnon:\t 88 kB\nRssFile:\t 816 kB\nRssShmem:\t 0 kB\nVmData:\t 224 kB\nVmStk:\t 132 kB\nVmExe:\t 20 kB\nVmLib:\t 1520 kB\nVmPTE:\t 40 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t4\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3112901\nNgid:\t0\nPid:\t3112901\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t3112901\nNSpid:\t3112901\nNSpgid:\t3112901\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 14684 kB\nVmRSS:\t 14612 kB\nRssAnon:\t 3760 kB\nRssFile:\t 10852 kB\nRssShmem:\t 0 kB\nVmData:\t 45324 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 116 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t11\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3112926\nNgid:\t0\nPid:\t3112926\nPPid:\t3112901\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t3112926\t1\nNSpid:\t3112926\t1\nNSpgid:\t3112926\t1\nNSsid:\t3112926\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t29\nnonvoluntary_ctxt_switches:\t9\n", "Name:\tchaos-operator\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3112959\nNgid:\t0\nPid:\t3112959\nPPid:\t3112901\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t1000\t1000\t1000\t1000\nFDSize:\t64\nGroups:\t1000 \nNStgid:\t3112959\t1\nNSpid:\t3112959\t1\nNSpgid:\t3112959\t1\nNSsid:\t3112959\t1\nVmPeak:\t 1262700 kB\nVmSize:\t 1262700 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 38888 kB\nVmRSS:\t 38888 kB\nRssAnon:\t 15496 kB\nRssFile:\t 23392 kB\nRssShmem:\t 0 kB\nVmData:\t 63428 kB\nVmStk:\t 132 kB\nVmExe:\t 15232 kB\nVmLib:\t 8 kB\nVmPTE:\t 200 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t35\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1336\nnonvoluntary_ctxt_switches:\t11\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3113360\nNgid:\t0\nPid:\t3113360\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t3113360\nNSpid:\t3113360\nNSpgid:\t3113360\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 13976 kB\nVmRSS:\t 13916 kB\nRssAnon:\t 3484 kB\nRssFile:\t 10432 kB\nRssShmem:\t 0 kB\nVmData:\t 41228 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 112 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t11\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3113384\nNgid:\t0\nPid:\t3113384\nPPid:\t3113360\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t3113384\t1\nNSpid:\t3113384\t1\nNSpgid:\t3113384\t1\nNSsid:\t3113384\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t24\nnonvoluntary_ctxt_switches:\t13\n", "Name:\tcoredns\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3113417\nNgid:\t0\nPid:\t3113417\nPPid:\t3113360\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t3113417\t1\nNSpid:\t3113417\t1\nNSpgid:\t3113417\t1\nNSsid:\t3113417\t1\nVmPeak:\t 748492 kB\nVmSize:\t 748492 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 41412 kB\nVmRSS:\t 41412 kB\nRssAnon:\t 12648 kB\nRssFile:\t 28764 kB\nRssShmem:\t 0 kB\nVmData:\t 108680 kB\nVmStk:\t 132 kB\nVmExe:\t 22032 kB\nVmLib:\t 8 kB\nVmPTE:\t 200 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t22\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffe7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80425fb\nCapEff:\t00000000a80425fb\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t960\nnonvoluntary_ctxt_switches:\t15\n", "", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t372\nNgid:\t0\nPid:\t372\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t372\nNSpid:\t372\nNSpgid:\t372\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 14124 kB\nVmRSS:\t 12968 kB\nRssAnon:\t 2676 kB\nRssFile:\t 10292 kB\nRssShmem:\t 0 kB\nVmData:\t 41228 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 116 kB\nVmSwap:\t 612 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t384\nNgid:\t0\nPid:\t384\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t384\nNSpid:\t384\nNSpgid:\t384\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 14288 kB\nVmRSS:\t 13628 kB\nRssAnon:\t 3176 kB\nRssFile:\t 10452 kB\nRssShmem:\t 0 kB\nVmData:\t 45324 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 120 kB\nVmSwap:\t 504 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t423\nNgid:\t0\nPid:\t423\nPPid:\t372\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t423\t1\nNSpid:\t423\t1\nNSpgid:\t423\t1\nNSsid:\t423\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t34\nnonvoluntary_ctxt_switches:\t8\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t430\nNgid:\t0\nPid:\t430\nPPid:\t384\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t430\t1\nNSpid:\t430\t1\nNSpgid:\t430\t1\nNSsid:\t430\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 24 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t35\nnonvoluntary_ctxt_switches:\t11\n", "Name:\tkube-proxy\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t479\nNgid:\t331610\nPid:\t479\nPPid:\t372\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t479\t1\nNSpid:\t479\t1\nNSpgid:\t479\t1\nNSsid:\t479\t1\nVmPeak:\t 1299688 kB\nVmSize:\t 1299688 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 56656 kB\nVmRSS:\t 32208 kB\nRssAnon:\t 16404 kB\nRssFile:\t 15804 kB\nRssShmem:\t 0 kB\nVmData:\t 78976 kB\nVmStk:\t 132 kB\nVmExe:\t 30348 kB\nVmLib:\t 8 kB\nVmPTE:\t 288 kB\nVmSwap:\t 472 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t38\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t96966\nnonvoluntary_ctxt_switches:\t133\n", "Name:\tkindnetd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t680\nNgid:\t117220\nPid:\t680\nPPid:\t384\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t680\t1\nNSpid:\t680\t1\nNSpgid:\t680\t1\nNSsid:\t680\t1\nVmPeak:\t 1276212 kB\nVmSize:\t 1276212 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 40068 kB\nVmRSS:\t 23992 kB\nRssAnon:\t 13368 kB\nRssFile:\t 10624 kB\nRssShmem:\t 0 kB\nVmData:\t 67572 kB\nVmStk:\t 132 kB\nVmExe:\t 21148 kB\nVmLib:\t 8 kB\nVmPTE:\t 248 kB\nVmSwap:\t 232 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t41\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80435fb\nCapEff:\t00000000a80435fb\nCapBnd:\t00000000a80435fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1091\nnonvoluntary_ctxt_switches:\t18\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t793\nNgid:\t0\nPid:\t793\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t793\nNSpid:\t793\nNSpgid:\t793\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 15024 kB\nVmRSS:\t 14408 kB\nRssAnon:\t 3488 kB\nRssFile:\t 10920 kB\nRssShmem:\t 0 kB\nVmData:\t 45324 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 124 kB\nVmSwap:\t 88 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t818\nNgid:\t0\nPid:\t818\nPPid:\t793\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t818\t1\nNSpid:\t818\t1\nNSpgid:\t818\t1\nNSsid:\t818\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t24\nnonvoluntary_ctxt_switches:\t7\n", "Name:\tsh\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t854\nNgid:\t0\nPid:\t854\nPPid:\t793\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t854\t1\nNSpid:\t854\t1\nNSpgid:\t854\t1\nNSsid:\t854\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1564 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 972 kB\nVmRSS:\t 84 kB\nRssAnon:\t 80 kB\nRssFile:\t 4 kB\nRssShmem:\t 0 kB\nVmData:\t 52 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 44 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000004\nSigCgt:\t0000000000010002\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t906\nnonvoluntary_ctxt_switches:\t9\n"] I, [2025-03-06 11:58:09 UTC #1422] INFO -- cnf-testsuite-proctree_by_pid: proctree_by_pid potential_parent_pid: 3113417 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: proc_statuses: ["Name:\tsystemd\nUmask:\t0000\nState:\tS (sleeping)\nTgid:\t1\nNgid:\t0\nPid:\t1\nPPid:\t0\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t256\nGroups:\t \nNStgid:\t1\nNSpid:\t1\nNSpgid:\t1\nNSsid:\t1\nVmPeak:\t 35920 kB\nVmSize:\t 35800 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 25920 kB\nVmRSS:\t 25332 kB\nRssAnon:\t 18052 kB\nRssFile:\t 7280 kB\nRssShmem:\t 0 kB\nVmData:\t 16892 kB\nVmStk:\t 1040 kB\nVmExe:\t 40 kB\nVmLib:\t 10680 kB\nVmPTE:\t 112 kB\nVmSwap:\t 672 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t7fe3c0fe28014a03\nSigIgn:\t0000000000001000\nSigCgt:\t00000000000004ec\nCapInh:\t0000003fffffffff\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t854445\nnonvoluntary_ctxt_switches:\t37992\n", "Name:\tsystemd-journal\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t162\nNgid:\t104252\nPid:\t162\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t162\nNSpid:\t162\nNSpgid:\t162\nNSsid:\t162\nVmPeak:\t 426936 kB\nVmSize:\t 348768 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 283184 kB\nVmRSS:\t 221268 kB\nRssAnon:\t 540 kB\nRssFile:\t 5680 kB\nRssShmem:\t 215048 kB\nVmData:\t 8968 kB\nVmStk:\t 132 kB\nVmExe:\t 92 kB\nVmLib:\t 9728 kB\nVmPTE:\t 580 kB\nVmSwap:\t 636 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000400004a02\nSigIgn:\t0000000000001000\nSigCgt:\t0000000100000040\nCapInh:\t0000000000000000\nCapPrm:\t00000025402800cf\nCapEff:\t00000025402800cf\nCapBnd:\t00000025402800cf\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t20\nSpeculation_Store_Bypass:\tthread force mitigated\nSpeculationIndirectBranch:\tconditional force disabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t528566\nnonvoluntary_ctxt_switches:\t1495\n", "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t1749\nNgid:\t0\nPid:\t1749\nPPid:\t854\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t1749\t888\nNSpid:\t1749\t888\nNSpgid:\t854\t1\nNSsid:\t854\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1532 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 20 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 40 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tcontainerd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t178\nNgid:\t0\nPid:\t178\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t2048\nGroups:\t \nNStgid:\t178\nNSpid:\t178\nNSpgid:\t178\nNSsid:\t178\nVmPeak:\t 7722728 kB\nVmSize:\t 7428472 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 134104 kB\nVmRSS:\t 86524 kB\nRssAnon:\t 61872 kB\nRssFile:\t 24652 kB\nRssShmem:\t 0 kB\nVmData:\t 650428 kB\nVmStk:\t 132 kB\nVmExe:\t 19352 kB\nVmLib:\t 1520 kB\nVmPTE:\t 1132 kB\nVmSwap:\t 1028 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t58\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t169\nnonvoluntary_ctxt_switches:\t1\n", "Name:\tkubelet\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t284\nNgid:\t114779\nPid:\t284\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t256\nGroups:\t \nNStgid:\t284\nNSpid:\t284\nNSpgid:\t284\nNSsid:\t284\nVmPeak:\t 8474868 kB\nVmSize:\t 8474868 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 126788 kB\nVmRSS:\t 113812 kB\nRssAnon:\t 82868 kB\nRssFile:\t 30944 kB\nRssShmem:\t 0 kB\nVmData:\t 962580 kB\nVmStk:\t 132 kB\nVmExe:\t 35216 kB\nVmLib:\t 1556 kB\nVmPTE:\t 1284 kB\nVmSwap:\t 1864 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t97\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t5932761\nnonvoluntary_ctxt_switches:\t7048\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111878\nNgid:\t0\nPid:\t3111878\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t3111878\nNSpid:\t3111878\nNSpgid:\t3111878\nNSsid:\t178\nVmPeak:\t 1238568 kB\nVmSize:\t 1238568 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 16236 kB\nVmRSS:\t 16140 kB\nRssAnon:\t 5012 kB\nRssFile:\t 11128 kB\nRssShmem:\t 0 kB\nVmData:\t 45580 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 120 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t12\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t82\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111903\nNgid:\t0\nPid:\t3111903\nPPid:\t3111878\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t3111903\nNSpid:\t3111903\nNSpgid:\t3111903\nNSsid:\t3111903\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t41\nnonvoluntary_ctxt_switches:\t7\n", "Name:\tsh\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111937\nNgid:\t0\nPid:\t3111937\nPPid:\t3111878\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t3111937\nNSpid:\t3111937\nNSpgid:\t3111937\nNSsid:\t3111937\nVmPeak:\t 2576 kB\nVmSize:\t 2576 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 928 kB\nVmRSS:\t 928 kB\nRssAnon:\t 88 kB\nRssFile:\t 840 kB\nRssShmem:\t 0 kB\nVmData:\t 232 kB\nVmStk:\t 132 kB\nVmExe:\t 76 kB\nVmLib:\t 1520 kB\nVmPTE:\t 44 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000010002\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t61\nnonvoluntary_ctxt_switches:\t8\n", "Name:\tsleep\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3111957\nNgid:\t0\nPid:\t3111957\nPPid:\t3111937\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t3111957\nNSpid:\t3111957\nNSpgid:\t3111937\nNSsid:\t3111937\nVmPeak:\t 2484 kB\nVmSize:\t 2484 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 904 kB\nVmRSS:\t 904 kB\nRssAnon:\t 88 kB\nRssFile:\t 816 kB\nRssShmem:\t 0 kB\nVmData:\t 224 kB\nVmStk:\t 132 kB\nVmExe:\t 20 kB\nVmLib:\t 1520 kB\nVmPTE:\t 40 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000000000\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t4\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3112901\nNgid:\t0\nPid:\t3112901\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t3112901\nNSpid:\t3112901\nNSpgid:\t3112901\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 14684 kB\nVmRSS:\t 14612 kB\nRssAnon:\t 3760 kB\nRssFile:\t 10852 kB\nRssShmem:\t 0 kB\nVmData:\t 45324 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 116 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t11\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3112926\nNgid:\t0\nPid:\t3112926\nPPid:\t3112901\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t3112926\t1\nNSpid:\t3112926\t1\nNSpgid:\t3112926\t1\nNSsid:\t3112926\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t29\nnonvoluntary_ctxt_switches:\t9\n", "Name:\tchaos-operator\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3112959\nNgid:\t0\nPid:\t3112959\nPPid:\t3112901\nTracerPid:\t0\nUid:\t1000\t1000\t1000\t1000\nGid:\t1000\t1000\t1000\t1000\nFDSize:\t64\nGroups:\t1000 \nNStgid:\t3112959\t1\nNSpid:\t3112959\t1\nNSpgid:\t3112959\t1\nNSsid:\t3112959\t1\nVmPeak:\t 1262700 kB\nVmSize:\t 1262700 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 38888 kB\nVmRSS:\t 38888 kB\nRssAnon:\t 15496 kB\nRssFile:\t 23392 kB\nRssShmem:\t 0 kB\nVmData:\t 63428 kB\nVmStk:\t 132 kB\nVmExe:\t 15232 kB\nVmLib:\t 8 kB\nVmPTE:\t 200 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t35\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1336\nnonvoluntary_ctxt_switches:\t11\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3113360\nNgid:\t0\nPid:\t3113360\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t3113360\nNSpid:\t3113360\nNSpgid:\t3113360\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 13976 kB\nVmRSS:\t 13916 kB\nRssAnon:\t 3484 kB\nRssFile:\t 10432 kB\nRssShmem:\t 0 kB\nVmData:\t 41228 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 112 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t11\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3113384\nNgid:\t0\nPid:\t3113384\nPPid:\t3113360\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t3113384\t1\nNSpid:\t3113384\t1\nNSpgid:\t3113384\t1\nNSsid:\t3113384\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t24\nnonvoluntary_ctxt_switches:\t13\n", "Name:\tcoredns\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t3113417\nNgid:\t0\nPid:\t3113417\nPPid:\t3113360\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t3113417\t1\nNSpid:\t3113417\t1\nNSpgid:\t3113417\t1\nNSsid:\t3113417\t1\nVmPeak:\t 748492 kB\nVmSize:\t 748492 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 41412 kB\nVmRSS:\t 41412 kB\nRssAnon:\t 12648 kB\nRssFile:\t 28764 kB\nRssShmem:\t 0 kB\nVmData:\t 108680 kB\nVmStk:\t 132 kB\nVmExe:\t 22032 kB\nVmLib:\t 8 kB\nVmPTE:\t 200 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t22\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffe7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80425fb\nCapEff:\t00000000a80425fb\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t960\nnonvoluntary_ctxt_switches:\t15\n", "", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t372\nNgid:\t0\nPid:\t372\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t372\nNSpid:\t372\nNSpgid:\t372\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 14124 kB\nVmRSS:\t 12968 kB\nRssAnon:\t 2676 kB\nRssFile:\t 10292 kB\nRssShmem:\t 0 kB\nVmData:\t 41228 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 116 kB\nVmSwap:\t 612 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t384\nNgid:\t0\nPid:\t384\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t384\nNSpid:\t384\nNSpgid:\t384\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 14288 kB\nVmRSS:\t 13628 kB\nRssAnon:\t 3176 kB\nRssFile:\t 10452 kB\nRssShmem:\t 0 kB\nVmData:\t 45324 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 120 kB\nVmSwap:\t 504 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t8\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t423\nNgid:\t0\nPid:\t423\nPPid:\t372\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t423\t1\nNSpid:\t423\t1\nNSpgid:\t423\t1\nNSsid:\t423\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t34\nnonvoluntary_ctxt_switches:\t8\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t430\nNgid:\t0\nPid:\t430\nPPid:\t384\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t430\t1\nNSpid:\t430\t1\nNSpgid:\t430\t1\nNSsid:\t430\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 24 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t2\nSeccomp_filters:\t1\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t35\nnonvoluntary_ctxt_switches:\t11\n", "Name:\tkube-proxy\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t479\nNgid:\t331610\nPid:\t479\nPPid:\t372\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t479\t1\nNSpid:\t479\t1\nNSpgid:\t479\t1\nNSsid:\t479\t1\nVmPeak:\t 1299688 kB\nVmSize:\t 1299688 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 56656 kB\nVmRSS:\t 32208 kB\nRssAnon:\t 16404 kB\nRssFile:\t 15804 kB\nRssShmem:\t 0 kB\nVmData:\t 78976 kB\nVmStk:\t 132 kB\nVmExe:\t 30348 kB\nVmLib:\t 8 kB\nVmPTE:\t 288 kB\nVmSwap:\t 472 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t38\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t96966\nnonvoluntary_ctxt_switches:\t133\n", "Name:\tkindnetd\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t680\nNgid:\t117220\nPid:\t680\nPPid:\t384\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 \nNStgid:\t680\t1\nNSpid:\t680\t1\nNSpgid:\t680\t1\nNSsid:\t680\t1\nVmPeak:\t 1276212 kB\nVmSize:\t 1276212 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 40068 kB\nVmRSS:\t 23992 kB\nRssAnon:\t 13368 kB\nRssFile:\t 10624 kB\nRssShmem:\t 0 kB\nVmData:\t 67572 kB\nVmStk:\t 132 kB\nVmExe:\t 21148 kB\nVmLib:\t 8 kB\nVmPTE:\t 248 kB\nVmSwap:\t 232 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t41\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba3a00\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t00000000a80435fb\nCapEff:\t00000000a80435fb\nCapBnd:\t00000000a80435fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t1091\nnonvoluntary_ctxt_switches:\t18\n", "Name:\tcontainerd-shim\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t793\nNgid:\t0\nPid:\t793\nPPid:\t1\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t \nNStgid:\t793\nNSpid:\t793\nNSpgid:\t793\nNSsid:\t178\nVmPeak:\t 1238312 kB\nVmSize:\t 1238312 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 15024 kB\nVmRSS:\t 14408 kB\nRssAnon:\t 3488 kB\nRssFile:\t 10920 kB\nRssShmem:\t 0 kB\nVmData:\t 45324 kB\nVmStk:\t 132 kB\nVmExe:\t 5628 kB\nVmLib:\t 8 kB\nVmPTE:\t 124 kB\nVmSwap:\t 88 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t13\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\tfffffffc3bba2800\nSigIgn:\t0000000000000000\nSigCgt:\tfffffffd7fc1feff\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t9\nnonvoluntary_ctxt_switches:\t0\n", "Name:\tpause\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t818\nNgid:\t0\nPid:\t818\nPPid:\t793\nTracerPid:\t0\nUid:\t65535\t65535\t65535\t65535\nGid:\t65535\t65535\t65535\t65535\nFDSize:\t64\nGroups:\t65535 \nNStgid:\t818\t1\nNSpid:\t818\t1\nNSpgid:\t818\t1\nNSsid:\t818\t1\nVmPeak:\t 1020 kB\nVmSize:\t 1020 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 4 kB\nVmRSS:\t 4 kB\nRssAnon:\t 4 kB\nRssFile:\t 0 kB\nRssShmem:\t 0 kB\nVmData:\t 152 kB\nVmStk:\t 132 kB\nVmExe:\t 536 kB\nVmLib:\t 8 kB\nVmPTE:\t 28 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t0/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000000\nSigCgt:\t0000000000014002\nCapInh:\t0000000000000000\nCapPrm:\t0000000000000000\nCapEff:\t0000000000000000\nCapBnd:\t00000000a80425fb\nCapAmb:\t0000000000000000\nNoNewPrivs:\t1\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t24\nnonvoluntary_ctxt_switches:\t7\n", "Name:\tsh\nUmask:\t0022\nState:\tS (sleeping)\nTgid:\t854\nNgid:\t0\nPid:\t854\nPPid:\t793\nTracerPid:\t0\nUid:\t0\t0\t0\t0\nGid:\t0\t0\t0\t0\nFDSize:\t64\nGroups:\t0 1 2 3 4 6 10 11 20 26 27 \nNStgid:\t854\t1\nNSpid:\t854\t1\nNSpgid:\t854\t1\nNSsid:\t854\t1\nVmPeak:\t 3552 kB\nVmSize:\t 1564 kB\nVmLck:\t 0 kB\nVmPin:\t 0 kB\nVmHWM:\t 972 kB\nVmRSS:\t 84 kB\nRssAnon:\t 80 kB\nRssFile:\t 4 kB\nRssShmem:\t 0 kB\nVmData:\t 52 kB\nVmStk:\t 132 kB\nVmExe:\t 788 kB\nVmLib:\t 556 kB\nVmPTE:\t 44 kB\nVmSwap:\t 0 kB\nHugetlbPages:\t 0 kB\nCoreDumping:\t0\nTHP_enabled:\t1\nThreads:\t1\nSigQ:\t3/256660\nSigPnd:\t0000000000000000\nShdPnd:\t0000000000000000\nSigBlk:\t0000000000000000\nSigIgn:\t0000000000000004\nSigCgt:\t0000000000010002\nCapInh:\t0000000000000000\nCapPrm:\t0000003fffffffff\nCapEff:\t0000003fffffffff\nCapBnd:\t0000003fffffffff\nCapAmb:\t0000000000000000\nNoNewPrivs:\t0\nSeccomp:\t0\nSeccomp_filters:\t0\nSpeculation_Store_Bypass:\tthread vulnerable\nSpeculationIndirectBranch:\tconditional enabled\nCpus_allowed:\tffffff,ffffffff,ffffffff\nCpus_allowed_list:\t0-87\nMems_allowed:\t00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003\nMems_allowed_list:\t0-1\nvoluntary_ctxt_switches:\t906\nnonvoluntary_ctxt_switches:\t9\n"] D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: systemd Umask: 0000 State: S (sleeping) Tgid: 1 Ngid: 0 Pid: 1 PPid: 0 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 256 Groups: NStgid: 1 NSpid: 1 NSpgid: 1 NSsid: 1 VmPeak: 35920 kB VmSize: 35800 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 25920 kB VmRSS: 25332 kB RssAnon: 18052 kB RssFile: 7280 kB RssShmem: 0 kB VmData: 16892 kB VmStk: 1040 kB VmExe: 40 kB VmLib: 10680 kB VmPTE: 112 kB VmSwap: 672 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 7fe3c0fe28014a03 SigIgn: 0000000000001000 SigCgt: 00000000000004ec CapInh: 0000003fffffffff CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 854445 nonvoluntary_ctxt_switches: 37992 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "systemd", "Umask" => "0000", "State" => "S (sleeping)", "Tgid" => "1", "Ngid" => "0", "Pid" => "1", "PPid" => "0", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "256", "Groups" => "", "NStgid" => "1", "NSpid" => "1", "NSpgid" => "1", "NSsid" => "1", "VmPeak" => "35920 kB", "VmSize" => "35800 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "25920 kB", "VmRSS" => "25332 kB", "RssAnon" => "18052 kB", "RssFile" => "7280 kB", "RssShmem" => "0 kB", "VmData" => "16892 kB", "VmStk" => "1040 kB", "VmExe" => "40 kB", "VmLib" => "10680 kB", "VmPTE" => "112 kB", "VmSwap" => "672 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "7fe3c0fe28014a03", "SigIgn" => "0000000000001000", "SigCgt" => "00000000000004ec", "CapInh" => "0000003fffffffff", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "854445", "nonvoluntary_ctxt_switches" => "37992"} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: systemd-journal Umask: 0022 State: S (sleeping) Tgid: 162 Ngid: 104252 Pid: 162 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 162 NSpid: 162 NSpgid: 162 NSsid: 162 VmPeak: 426936 kB VmSize: 348768 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 283184 kB VmRSS: 221268 kB RssAnon: 540 kB RssFile: 5680 kB RssShmem: 215048 kB VmData: 8968 kB VmStk: 132 kB VmExe: 92 kB VmLib: 9728 kB VmPTE: 580 kB VmSwap: 636 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000400004a02 SigIgn: 0000000000001000 SigCgt: 0000000100000040 CapInh: 0000000000000000 CapPrm: 00000025402800cf CapEff: 00000025402800cf CapBnd: 00000025402800cf CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 20 Speculation_Store_Bypass: thread force mitigated SpeculationIndirectBranch: conditional force disabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 528566 nonvoluntary_ctxt_switches: 1495 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "systemd-journal", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "162", "Ngid" => "104252", "Pid" => "162", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "", "NStgid" => "162", "NSpid" => "162", "NSpgid" => "162", "NSsid" => "162", "VmPeak" => "426936 kB", "VmSize" => "348768 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "283184 kB", "VmRSS" => "221268 kB", "RssAnon" => "540 kB", "RssFile" => "5680 kB", "RssShmem" => "215048 kB", "VmData" => "8968 kB", "VmStk" => "132 kB", "VmExe" => "92 kB", "VmLib" => "9728 kB", "VmPTE" => "580 kB", "VmSwap" => "636 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000400004a02", "SigIgn" => "0000000000001000", "SigCgt" => "0000000100000040", "CapInh" => "0000000000000000", "CapPrm" => "00000025402800cf", "CapEff" => "00000025402800cf", "CapBnd" => "00000025402800cf", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "2", "Seccomp_filters" => "20", "Speculation_Store_Bypass" => "thread force mitigated", "SpeculationIndirectBranch" => "conditional force disabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "528566", "nonvoluntary_ctxt_switches" => "1495"} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: sleep Umask: 0022 State: S (sleeping) Tgid: 1749 Ngid: 0 Pid: 1749 PPid: 854 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 1 2 3 4 6 10 11 20 26 27 NStgid: 1749 888 NSpid: 1749 888 NSpgid: 854 1 NSsid: 854 1 VmPeak: 3552 kB VmSize: 1532 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 20 kB VmStk: 132 kB VmExe: 788 kB VmLib: 556 kB VmPTE: 40 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000000000 CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 1 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "sleep", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "1749", "Ngid" => "0", "Pid" => "1749", "PPid" => "854", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0 1 2 3 4 6 10 11 20 26 27", "NStgid" => "1749\t888", "NSpid" => "1749\t888", "NSpgid" => "854\t1", "NSsid" => "854\t1", "VmPeak" => "3552 kB", "VmSize" => "1532 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "20 kB", "VmStk" => "132 kB", "VmExe" => "788 kB", "VmLib" => "556 kB", "VmPTE" => "40 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000000000", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "1", "nonvoluntary_ctxt_switches" => "0"} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: containerd Umask: 0022 State: S (sleeping) Tgid: 178 Ngid: 0 Pid: 178 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 2048 Groups: NStgid: 178 NSpid: 178 NSpgid: 178 NSsid: 178 VmPeak: 7722728 kB VmSize: 7428472 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 134104 kB VmRSS: 86524 kB RssAnon: 61872 kB RssFile: 24652 kB RssShmem: 0 kB VmData: 650428 kB VmStk: 132 kB VmExe: 19352 kB VmLib: 1520 kB VmPTE: 1132 kB VmSwap: 1028 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 58 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 169 nonvoluntary_ctxt_switches: 1 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "containerd", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "178", "Ngid" => "0", "Pid" => "178", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "2048", "Groups" => "", "NStgid" => "178", "NSpid" => "178", "NSpgid" => "178", "NSsid" => "178", "VmPeak" => "7722728 kB", "VmSize" => "7428472 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "134104 kB", "VmRSS" => "86524 kB", "RssAnon" => "61872 kB", "RssFile" => "24652 kB", "RssShmem" => "0 kB", "VmData" => "650428 kB", "VmStk" => "132 kB", "VmExe" => "19352 kB", "VmLib" => "1520 kB", "VmPTE" => "1132 kB", "VmSwap" => "1028 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "58", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "169", "nonvoluntary_ctxt_switches" => "1"} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: kubelet Umask: 0022 State: S (sleeping) Tgid: 284 Ngid: 114779 Pid: 284 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 256 Groups: NStgid: 284 NSpid: 284 NSpgid: 284 NSsid: 284 VmPeak: 8474868 kB VmSize: 8474868 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 126788 kB VmRSS: 113812 kB RssAnon: 82868 kB RssFile: 30944 kB RssShmem: 0 kB VmData: 962580 kB VmStk: 132 kB VmExe: 35216 kB VmLib: 1556 kB VmPTE: 1284 kB VmSwap: 1864 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 97 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 5932761 nonvoluntary_ctxt_switches: 7048 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "kubelet", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "284", "Ngid" => "114779", "Pid" => "284", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "256", "Groups" => "", "NStgid" => "284", "NSpid" => "284", "NSpgid" => "284", "NSsid" => "284", "VmPeak" => "8474868 kB", "VmSize" => "8474868 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "126788 kB", "VmRSS" => "113812 kB", "RssAnon" => "82868 kB", "RssFile" => "30944 kB", "RssShmem" => "0 kB", "VmData" => "962580 kB", "VmStk" => "132 kB", "VmExe" => "35216 kB", "VmLib" => "1556 kB", "VmPTE" => "1284 kB", "VmSwap" => "1864 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "97", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "5932761", "nonvoluntary_ctxt_switches" => "7048"} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 3111878 Ngid: 0 Pid: 3111878 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 3111878 NSpid: 3111878 NSpgid: 3111878 NSsid: 178 VmPeak: 1238568 kB VmSize: 1238568 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 16236 kB VmRSS: 16140 kB RssAnon: 5012 kB RssFile: 11128 kB RssShmem: 0 kB VmData: 45580 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 120 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 12 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 82 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3111878", "Ngid" => "0", "Pid" => "3111878", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "", "NStgid" => "3111878", "NSpid" => "3111878", "NSpgid" => "3111878", "NSsid" => "178", "VmPeak" => "1238568 kB", "VmSize" => "1238568 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "16236 kB", "VmRSS" => "16140 kB", "RssAnon" => "5012 kB", "RssFile" => "11128 kB", "RssShmem" => "0 kB", "VmData" => "45580 kB", "VmStk" => "132 kB", "VmExe" => "5628 kB", "VmLib" => "8 kB", "VmPTE" => "120 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "12", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "82", "nonvoluntary_ctxt_switches" => "0"} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 3111903 Ngid: 0 Pid: 3111903 PPid: 3111878 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 3111903 NSpid: 3111903 NSpgid: 3111903 NSsid: 3111903 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 41 nonvoluntary_ctxt_switches: 7 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3111903", "Ngid" => "0", "Pid" => "3111903", "PPid" => "3111878", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "3111903", "NSpid" => "3111903", "NSpgid" => "3111903", "NSsid" => "3111903", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "28 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "41", "nonvoluntary_ctxt_switches" => "7"} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: sh Umask: 0022 State: S (sleeping) Tgid: 3111937 Ngid: 0 Pid: 3111937 PPid: 3111878 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 3111937 NSpid: 3111937 NSpgid: 3111937 NSsid: 3111937 VmPeak: 2576 kB VmSize: 2576 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 928 kB VmRSS: 928 kB RssAnon: 88 kB RssFile: 840 kB RssShmem: 0 kB VmData: 232 kB VmStk: 132 kB VmExe: 76 kB VmLib: 1520 kB VmPTE: 44 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000010002 CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 61 nonvoluntary_ctxt_switches: 8 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "sh", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3111937", "Ngid" => "0", "Pid" => "3111937", "PPid" => "3111878", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "3111937", "NSpid" => "3111937", "NSpgid" => "3111937", "NSsid" => "3111937", "VmPeak" => "2576 kB", "VmSize" => "2576 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "928 kB", "VmRSS" => "928 kB", "RssAnon" => "88 kB", "RssFile" => "840 kB", "RssShmem" => "0 kB", "VmData" => "232 kB", "VmStk" => "132 kB", "VmExe" => "76 kB", "VmLib" => "1520 kB", "VmPTE" => "44 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000010002", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "61", "nonvoluntary_ctxt_switches" => "8"} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: sleep Umask: 0022 State: S (sleeping) Tgid: 3111957 Ngid: 0 Pid: 3111957 PPid: 3111937 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 3111957 NSpid: 3111957 NSpgid: 3111937 NSsid: 3111937 VmPeak: 2484 kB VmSize: 2484 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 904 kB VmRSS: 904 kB RssAnon: 88 kB RssFile: 816 kB RssShmem: 0 kB VmData: 224 kB VmStk: 132 kB VmExe: 20 kB VmLib: 1520 kB VmPTE: 40 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000000000 CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 4 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "sleep", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3111957", "Ngid" => "0", "Pid" => "3111957", "PPid" => "3111937", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "3111957", "NSpid" => "3111957", "NSpgid" => "3111937", "NSsid" => "3111937", "VmPeak" => "2484 kB", "VmSize" => "2484 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "904 kB", "VmRSS" => "904 kB", "RssAnon" => "88 kB", "RssFile" => "816 kB", "RssShmem" => "0 kB", "VmData" => "224 kB", "VmStk" => "132 kB", "VmExe" => "20 kB", "VmLib" => "1520 kB", "VmPTE" => "40 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000000000", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "4", "nonvoluntary_ctxt_switches" => "0"} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 3112901 Ngid: 0 Pid: 3112901 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 3112901 NSpid: 3112901 NSpgid: 3112901 NSsid: 178 VmPeak: 1238312 kB VmSize: 1238312 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 14684 kB VmRSS: 14612 kB RssAnon: 3760 kB RssFile: 10852 kB RssShmem: 0 kB VmData: 45324 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 116 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 11 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 9 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3112901", "Ngid" => "0", "Pid" => "3112901", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "", "NStgid" => "3112901", "NSpid" => "3112901", "NSpgid" => "3112901", "NSsid" => "178", "VmPeak" => "1238312 kB", "VmSize" => "1238312 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "14684 kB", "VmRSS" => "14612 kB", "RssAnon" => "3760 kB", "RssFile" => "10852 kB", "RssShmem" => "0 kB", "VmData" => "45324 kB", "VmStk" => "132 kB", "VmExe" => "5628 kB", "VmLib" => "8 kB", "VmPTE" => "116 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "11", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "9", "nonvoluntary_ctxt_switches" => "0"} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 3112926 Ngid: 0 Pid: 3112926 PPid: 3112901 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 3112926 1 NSpid: 3112926 1 NSpgid: 3112926 1 NSsid: 3112926 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 29 nonvoluntary_ctxt_switches: 9 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3112926", "Ngid" => "0", "Pid" => "3112926", "PPid" => "3112901", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "3112926\t1", "NSpid" => "3112926\t1", "NSpgid" => "3112926\t1", "NSsid" => "3112926\t1", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "28 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "2", "Seccomp_filters" => "1", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "29", "nonvoluntary_ctxt_switches" => "9"} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: chaos-operator Umask: 0022 State: S (sleeping) Tgid: 3112959 Ngid: 0 Pid: 3112959 PPid: 3112901 TracerPid: 0 Uid: 1000 1000 1000 1000 Gid: 1000 1000 1000 1000 FDSize: 64 Groups: 1000 NStgid: 3112959 1 NSpid: 3112959 1 NSpgid: 3112959 1 NSsid: 3112959 1 VmPeak: 1262700 kB VmSize: 1262700 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 38888 kB VmRSS: 38888 kB RssAnon: 15496 kB RssFile: 23392 kB RssShmem: 0 kB VmData: 63428 kB VmStk: 132 kB VmExe: 15232 kB VmLib: 8 kB VmPTE: 200 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 35 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 1336 nonvoluntary_ctxt_switches: 11 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "chaos-operator", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3112959", "Ngid" => "0", "Pid" => "3112959", "PPid" => "3112901", "TracerPid" => "0", "Uid" => "1000\t1000\t1000\t1000", "Gid" => "1000\t1000\t1000\t1000", "FDSize" => "64", "Groups" => "1000", "NStgid" => "3112959\t1", "NSpid" => "3112959\t1", "NSpgid" => "3112959\t1", "NSsid" => "3112959\t1", "VmPeak" => "1262700 kB", "VmSize" => "1262700 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "38888 kB", "VmRSS" => "38888 kB", "RssAnon" => "15496 kB", "RssFile" => "23392 kB", "RssShmem" => "0 kB", "VmData" => "63428 kB", "VmStk" => "132 kB", "VmExe" => "15232 kB", "VmLib" => "8 kB", "VmPTE" => "200 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "35", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "1336", "nonvoluntary_ctxt_switches" => "11"} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 3113360 Ngid: 0 Pid: 3113360 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 3113360 NSpid: 3113360 NSpgid: 3113360 NSsid: 178 VmPeak: 1238312 kB VmSize: 1238312 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 13976 kB VmRSS: 13916 kB RssAnon: 3484 kB RssFile: 10432 kB RssShmem: 0 kB VmData: 41228 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 112 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 11 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 8 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3113360", "Ngid" => "0", "Pid" => "3113360", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "", "NStgid" => "3113360", "NSpid" => "3113360", "NSpgid" => "3113360", "NSsid" => "178", "VmPeak" => "1238312 kB", "VmSize" => "1238312 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "13976 kB", "VmRSS" => "13916 kB", "RssAnon" => "3484 kB", "RssFile" => "10432 kB", "RssShmem" => "0 kB", "VmData" => "41228 kB", "VmStk" => "132 kB", "VmExe" => "5628 kB", "VmLib" => "8 kB", "VmPTE" => "112 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "11", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "8", "nonvoluntary_ctxt_switches" => "0"} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 3113384 Ngid: 0 Pid: 3113384 PPid: 3113360 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 3113384 1 NSpid: 3113384 1 NSpgid: 3113384 1 NSsid: 3113384 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 24 nonvoluntary_ctxt_switches: 13 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3113384", "Ngid" => "0", "Pid" => "3113384", "PPid" => "3113360", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "3113384\t1", "NSpid" => "3113384\t1", "NSpgid" => "3113384\t1", "NSsid" => "3113384\t1", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "28 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "2", "Seccomp_filters" => "1", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "24", "nonvoluntary_ctxt_switches" => "13"} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: coredns Umask: 0022 State: S (sleeping) Tgid: 3113417 Ngid: 0 Pid: 3113417 PPid: 3113360 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 3113417 1 NSpid: 3113417 1 NSpgid: 3113417 1 NSsid: 3113417 1 VmPeak: 748492 kB VmSize: 748492 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 41412 kB VmRSS: 41412 kB RssAnon: 12648 kB RssFile: 28764 kB RssShmem: 0 kB VmData: 108680 kB VmStk: 132 kB VmExe: 22032 kB VmLib: 8 kB VmPTE: 200 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 22 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffe7fc1feff CapInh: 0000000000000000 CapPrm: 00000000a80425fb CapEff: 00000000a80425fb CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 960 nonvoluntary_ctxt_switches: 15 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "coredns", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3113417", "Ngid" => "0", "Pid" => "3113417", "PPid" => "3113360", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "3113417\t1", "NSpid" => "3113417\t1", "NSpgid" => "3113417\t1", "NSsid" => "3113417\t1", "VmPeak" => "748492 kB", "VmSize" => "748492 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "41412 kB", "VmRSS" => "41412 kB", "RssAnon" => "12648 kB", "RssFile" => "28764 kB", "RssShmem" => "0 kB", "VmData" => "108680 kB", "VmStk" => "132 kB", "VmExe" => "22032 kB", "VmLib" => "8 kB", "VmPTE" => "200 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "22", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffe7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "00000000a80425fb", "CapEff" => "00000000a80425fb", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "960", "nonvoluntary_ctxt_switches" => "15"} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: I, [2025-03-06 11:58:09 UTC #1422] INFO -- cnf-testsuite: cmdline_by_pid I, [2025-03-06 11:58:09 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:58:09 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- cat /proc/3113417/cmdline I, [2025-03-06 11:58:09 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- cat /proc/3113417/cmdline D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: /coredns-conf/etc/coredns/Corefile D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000", error: ""} I, [2025-03-06 11:58:09 UTC #1422] INFO -- cnf-testsuite: cmdline_by_node cmdline: {status: Process::Status[0], output: "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000", error: ""} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: current_pid == potential_parent_pid D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 372 Ngid: 0 Pid: 372 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 372 NSpid: 372 NSpgid: 372 NSsid: 178 VmPeak: 1238312 kB VmSize: 1238312 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 14124 kB VmRSS: 12968 kB RssAnon: 2676 kB RssFile: 10292 kB RssShmem: 0 kB VmData: 41228 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 116 kB VmSwap: 612 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 13 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 9 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "372", "Ngid" => "0", "Pid" => "372", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "", "NStgid" => "372", "NSpid" => "372", "NSpgid" => "372", "NSsid" => "178", "VmPeak" => "1238312 kB", "VmSize" => "1238312 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "14124 kB", "VmRSS" => "12968 kB", "RssAnon" => "2676 kB", "RssFile" => "10292 kB", "RssShmem" => "0 kB", "VmData" => "41228 kB", "VmStk" => "132 kB", "VmExe" => "5628 kB", "VmLib" => "8 kB", "VmPTE" => "116 kB", "VmSwap" => "612 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "13", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "9", "nonvoluntary_ctxt_switches" => "0"} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 384 Ngid: 0 Pid: 384 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 384 NSpid: 384 NSpgid: 384 NSsid: 178 VmPeak: 1238312 kB VmSize: 1238312 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 14288 kB VmRSS: 13628 kB RssAnon: 3176 kB RssFile: 10452 kB RssShmem: 0 kB VmData: 45324 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 120 kB VmSwap: 504 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 13 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 8 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "384", "Ngid" => "0", "Pid" => "384", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "", "NStgid" => "384", "NSpid" => "384", "NSpgid" => "384", "NSsid" => "178", "VmPeak" => "1238312 kB", "VmSize" => "1238312 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "14288 kB", "VmRSS" => "13628 kB", "RssAnon" => "3176 kB", "RssFile" => "10452 kB", "RssShmem" => "0 kB", "VmData" => "45324 kB", "VmStk" => "132 kB", "VmExe" => "5628 kB", "VmLib" => "8 kB", "VmPTE" => "120 kB", "VmSwap" => "504 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "13", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "8", "nonvoluntary_ctxt_switches" => "0"} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 423 Ngid: 0 Pid: 423 PPid: 372 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 423 1 NSpid: 423 1 NSpgid: 423 1 NSsid: 423 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 34 nonvoluntary_ctxt_switches: 8 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "423", "Ngid" => "0", "Pid" => "423", "PPid" => "372", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "423\t1", "NSpid" => "423\t1", "NSpgid" => "423\t1", "NSsid" => "423\t1", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "28 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "34", "nonvoluntary_ctxt_switches" => "8"} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 430 Ngid: 0 Pid: 430 PPid: 384 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 430 1 NSpid: 430 1 NSpgid: 430 1 NSsid: 430 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 24 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 2 Seccomp_filters: 1 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 35 nonvoluntary_ctxt_switches: 11 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "430", "Ngid" => "0", "Pid" => "430", "PPid" => "384", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "430\t1", "NSpid" => "430\t1", "NSpgid" => "430\t1", "NSsid" => "430\t1", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "24 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "2", "Seccomp_filters" => "1", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "35", "nonvoluntary_ctxt_switches" => "11"} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: kube-proxy Umask: 0022 State: S (sleeping) Tgid: 479 Ngid: 331610 Pid: 479 PPid: 372 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 479 1 NSpid: 479 1 NSpgid: 479 1 NSsid: 479 1 VmPeak: 1299688 kB VmSize: 1299688 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 56656 kB VmRSS: 32208 kB RssAnon: 16404 kB RssFile: 15804 kB RssShmem: 0 kB VmData: 78976 kB VmStk: 132 kB VmExe: 30348 kB VmLib: 8 kB VmPTE: 288 kB VmSwap: 472 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 38 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 96966 nonvoluntary_ctxt_switches: 133 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "kube-proxy", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "479", "Ngid" => "331610", "Pid" => "479", "PPid" => "372", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "479\t1", "NSpid" => "479\t1", "NSpgid" => "479\t1", "NSsid" => "479\t1", "VmPeak" => "1299688 kB", "VmSize" => "1299688 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "56656 kB", "VmRSS" => "32208 kB", "RssAnon" => "16404 kB", "RssFile" => "15804 kB", "RssShmem" => "0 kB", "VmData" => "78976 kB", "VmStk" => "132 kB", "VmExe" => "30348 kB", "VmLib" => "8 kB", "VmPTE" => "288 kB", "VmSwap" => "472 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "38", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "96966", "nonvoluntary_ctxt_switches" => "133"} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: kindnetd Umask: 0022 State: S (sleeping) Tgid: 680 Ngid: 117220 Pid: 680 PPid: 384 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 NStgid: 680 1 NSpid: 680 1 NSpgid: 680 1 NSsid: 680 1 VmPeak: 1276212 kB VmSize: 1276212 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 40068 kB VmRSS: 23992 kB RssAnon: 13368 kB RssFile: 10624 kB RssShmem: 0 kB VmData: 67572 kB VmStk: 132 kB VmExe: 21148 kB VmLib: 8 kB VmPTE: 248 kB VmSwap: 232 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 41 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba3a00 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 00000000a80435fb CapEff: 00000000a80435fb CapBnd: 00000000a80435fb CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 1091 nonvoluntary_ctxt_switches: 18 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "kindnetd", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "680", "Ngid" => "117220", "Pid" => "680", "PPid" => "384", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "680\t1", "NSpid" => "680\t1", "NSpgid" => "680\t1", "NSsid" => "680\t1", "VmPeak" => "1276212 kB", "VmSize" => "1276212 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "40068 kB", "VmRSS" => "23992 kB", "RssAnon" => "13368 kB", "RssFile" => "10624 kB", "RssShmem" => "0 kB", "VmData" => "67572 kB", "VmStk" => "132 kB", "VmExe" => "21148 kB", "VmLib" => "8 kB", "VmPTE" => "248 kB", "VmSwap" => "232 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "41", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba3a00", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "00000000a80435fb", "CapEff" => "00000000a80435fb", "CapBnd" => "00000000a80435fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "1091", "nonvoluntary_ctxt_switches" => "18"} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: containerd-shim Umask: 0022 State: S (sleeping) Tgid: 793 Ngid: 0 Pid: 793 PPid: 1 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: NStgid: 793 NSpid: 793 NSpgid: 793 NSsid: 178 VmPeak: 1238312 kB VmSize: 1238312 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 15024 kB VmRSS: 14408 kB RssAnon: 3488 kB RssFile: 10920 kB RssShmem: 0 kB VmData: 45324 kB VmStk: 132 kB VmExe: 5628 kB VmLib: 8 kB VmPTE: 124 kB VmSwap: 88 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 13 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: fffffffc3bba2800 SigIgn: 0000000000000000 SigCgt: fffffffd7fc1feff CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 9 nonvoluntary_ctxt_switches: 0 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "containerd-shim", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "793", "Ngid" => "0", "Pid" => "793", "PPid" => "1", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "", "NStgid" => "793", "NSpid" => "793", "NSpgid" => "793", "NSsid" => "178", "VmPeak" => "1238312 kB", "VmSize" => "1238312 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "15024 kB", "VmRSS" => "14408 kB", "RssAnon" => "3488 kB", "RssFile" => "10920 kB", "RssShmem" => "0 kB", "VmData" => "45324 kB", "VmStk" => "132 kB", "VmExe" => "5628 kB", "VmLib" => "8 kB", "VmPTE" => "124 kB", "VmSwap" => "88 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "13", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "fffffffc3bba2800", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffd7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "9", "nonvoluntary_ctxt_switches" => "0"} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: pause Umask: 0022 State: S (sleeping) Tgid: 818 Ngid: 0 Pid: 818 PPid: 793 TracerPid: 0 Uid: 65535 65535 65535 65535 Gid: 65535 65535 65535 65535 FDSize: 64 Groups: 65535 NStgid: 818 1 NSpid: 818 1 NSpgid: 818 1 NSsid: 818 1 VmPeak: 1020 kB VmSize: 1020 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 4 kB VmRSS: 4 kB RssAnon: 4 kB RssFile: 0 kB RssShmem: 0 kB VmData: 152 kB VmStk: 132 kB VmExe: 536 kB VmLib: 8 kB VmPTE: 28 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 0/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000000 SigCgt: 0000000000014002 CapInh: 0000000000000000 CapPrm: 0000000000000000 CapEff: 0000000000000000 CapBnd: 00000000a80425fb CapAmb: 0000000000000000 NoNewPrivs: 1 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 24 nonvoluntary_ctxt_switches: 7 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "pause", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "818", "Ngid" => "0", "Pid" => "818", "PPid" => "793", "TracerPid" => "0", "Uid" => "65535\t65535\t65535\t65535", "Gid" => "65535\t65535\t65535\t65535", "FDSize" => "64", "Groups" => "65535", "NStgid" => "818\t1", "NSpid" => "818\t1", "NSpgid" => "818\t1", "NSsid" => "818\t1", "VmPeak" => "1020 kB", "VmSize" => "1020 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "4 kB", "VmRSS" => "4 kB", "RssAnon" => "4 kB", "RssFile" => "0 kB", "RssShmem" => "0 kB", "VmData" => "152 kB", "VmStk" => "132 kB", "VmExe" => "536 kB", "VmLib" => "8 kB", "VmPTE" => "28 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "0/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "0000000000014002", "CapInh" => "0000000000000000", "CapPrm" => "0000000000000000", "CapEff" => "0000000000000000", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "1", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "24", "nonvoluntary_ctxt_switches" => "7"} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: parse_status status_output: Name: sh Umask: 0022 State: S (sleeping) Tgid: 854 Ngid: 0 Pid: 854 PPid: 793 TracerPid: 0 Uid: 0 0 0 0 Gid: 0 0 0 0 FDSize: 64 Groups: 0 1 2 3 4 6 10 11 20 26 27 NStgid: 854 1 NSpid: 854 1 NSpgid: 854 1 NSsid: 854 1 VmPeak: 3552 kB VmSize: 1564 kB VmLck: 0 kB VmPin: 0 kB VmHWM: 972 kB VmRSS: 84 kB RssAnon: 80 kB RssFile: 4 kB RssShmem: 0 kB VmData: 52 kB VmStk: 132 kB VmExe: 788 kB VmLib: 556 kB VmPTE: 44 kB VmSwap: 0 kB HugetlbPages: 0 kB CoreDumping: 0 THP_enabled: 1 Threads: 1 SigQ: 3/256660 SigPnd: 0000000000000000 ShdPnd: 0000000000000000 SigBlk: 0000000000000000 SigIgn: 0000000000000004 SigCgt: 0000000000010002 CapInh: 0000000000000000 CapPrm: 0000003fffffffff CapEff: 0000003fffffffff CapBnd: 0000003fffffffff CapAmb: 0000000000000000 NoNewPrivs: 0 Seccomp: 0 Seccomp_filters: 0 Speculation_Store_Bypass: thread vulnerable SpeculationIndirectBranch: conditional enabled Cpus_allowed: ffffff,ffffffff,ffffffff Cpus_allowed_list: 0-87 Mems_allowed: 00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003 Mems_allowed_list: 0-1 voluntary_ctxt_switches: 906 nonvoluntary_ctxt_switches: 9 D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: parsed_status: {"Name" => "sh", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "854", "Ngid" => "0", "Pid" => "854", "PPid" => "793", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0 1 2 3 4 6 10 11 20 26 27", "NStgid" => "854\t1", "NSpid" => "854\t1", "NSpgid" => "854\t1", "NSsid" => "854\t1", "VmPeak" => "3552 kB", "VmSize" => "1564 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "972 kB", "VmRSS" => "84 kB", "RssAnon" => "80 kB", "RssFile" => "4 kB", "RssShmem" => "0 kB", "VmData" => "52 kB", "VmStk" => "132 kB", "VmExe" => "788 kB", "VmLib" => "556 kB", "VmPTE" => "44 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "1", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000004", "SigCgt" => "0000000000010002", "CapInh" => "0000000000000000", "CapPrm" => "0000003fffffffff", "CapEff" => "0000003fffffffff", "CapBnd" => "0000003fffffffff", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "906", "nonvoluntary_ctxt_switches" => "9"} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: proctree: [{"Name" => "coredns", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3113417", "Ngid" => "0", "Pid" => "3113417", "PPid" => "3113360", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "3113417\t1", "NSpid" => "3113417\t1", "NSpgid" => "3113417\t1", "NSsid" => "3113417\t1", "VmPeak" => "748492 kB", "VmSize" => "748492 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "41412 kB", "VmRSS" => "41412 kB", "RssAnon" => "12648 kB", "RssFile" => "28764 kB", "RssShmem" => "0 kB", "VmData" => "108680 kB", "VmStk" => "132 kB", "VmExe" => "22032 kB", "VmLib" => "8 kB", "VmPTE" => "200 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "22", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffe7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "00000000a80425fb", "CapEff" => "00000000a80425fb", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "960", "nonvoluntary_ctxt_switches" => "15", "cmdline" => "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000"}] D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-proctree_by_pid: I, [2025-03-06 11:58:09 UTC #1422] INFO -- cnf-testsuite: 3113417 && 3113417 != 3113417: false D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite-sig_term_handled: status: {"Name" => "coredns", "Umask" => "0022", "State" => "S (sleeping)", "Tgid" => "3113417", "Ngid" => "0", "Pid" => "3113417", "PPid" => "3113360", "TracerPid" => "0", "Uid" => "0\t0\t0\t0", "Gid" => "0\t0\t0\t0", "FDSize" => "64", "Groups" => "0", "NStgid" => "3113417\t1", "NSpid" => "3113417\t1", "NSpgid" => "3113417\t1", "NSsid" => "3113417\t1", "VmPeak" => "748492 kB", "VmSize" => "748492 kB", "VmLck" => "0 kB", "VmPin" => "0 kB", "VmHWM" => "41412 kB", "VmRSS" => "41412 kB", "RssAnon" => "12648 kB", "RssFile" => "28764 kB", "RssShmem" => "0 kB", "VmData" => "108680 kB", "VmStk" => "132 kB", "VmExe" => "22032 kB", "VmLib" => "8 kB", "VmPTE" => "200 kB", "VmSwap" => "0 kB", "HugetlbPages" => "0 kB", "CoreDumping" => "0", "THP_enabled" => "1", "Threads" => "22", "SigQ" => "3/256660", "SigPnd" => "0000000000000000", "ShdPnd" => "0000000000000000", "SigBlk" => "0000000000000000", "SigIgn" => "0000000000000000", "SigCgt" => "fffffffe7fc1feff", "CapInh" => "0000000000000000", "CapPrm" => "00000000a80425fb", "CapEff" => "00000000a80425fb", "CapBnd" => "00000000a80425fb", "CapAmb" => "0000000000000000", "NoNewPrivs" => "0", "Seccomp" => "0", "Seccomp_filters" => "0", "Speculation_Store_Bypass" => "thread vulnerable", "SpeculationIndirectBranch" => "conditional enabled", "Cpus_allowed" => "ffffff,ffffffff,ffffffff", "Cpus_allowed_list" => "0-87", "Mems_allowed" => "00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003", "Mems_allowed_list" => "0-1", "voluntary_ctxt_switches" => "960", "nonvoluntary_ctxt_switches" => "15", "cmdline" => "/coredns\u0000-conf\u0000/etc/coredns/Corefile\u0000"} I, [2025-03-06 11:58:09 UTC #1422] INFO -- cnf-testsuite-sig_term_handled: status cmdline: /coredns-conf/etc/coredns/Corefile I, [2025-03-06 11:58:09 UTC #1422] INFO -- cnf-testsuite-sig_term_handled: Pid: 3113417 I, [2025-03-06 11:58:09 UTC #1422] INFO -- cnf-testsuite-sig_term_handled: Tgid: 3113417 I, [2025-03-06 11:58:09 UTC #1422] INFO -- cnf-testsuite-sig_term_handled: status name: coredns I, [2025-03-06 11:58:09 UTC #1422] INFO -- cnf-testsuite-sig_term_handled: previous status name: initial_name D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:58:09 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:58:09 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- strace -p 3113417 -e 'trace=!all' 2>&1 | tee /tmp/3113417-strace D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- strace -p 3113417 -e 'trace=!all' 2>&1 | tee /tmp/3113417-strace I, [2025-03-06 11:58:10 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec_bg command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- strace -p 3113417 -e 'trace=!all' 2>&1 | tee /tmp/3113417-strace D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec_bg output: D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {process: #), @wait_count=2, @channel=#>, output: "", error: ""} I, [2025-03-06 11:58:10 UTC #1422] INFO -- cnf-testsuite: exec_by_node: Called with JSON D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: pods_by_node D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: items labels: {"beta.kubernetes.io/arch" => "amd64", "beta.kubernetes.io/os" => "linux", "io.kubernetes.storage.mock/node" => "some-mock-node", "kubernetes.io/arch" => "amd64", "kubernetes.io/hostname" => "v132-worker2", "kubernetes.io/os" => "linux", "topology.hostpath.csi/node" => "v132-worker2"} D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: NodeName: v132-worker2 I, [2025-03-06 11:58:10 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.pods command: kubectl get pods --all-namespaces -o json D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.pods output: { "apiVersion": "v1", "items": [ { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": "2025-03-06T11:53:44Z", "generateName": "coredns-coredns-64fc886fd4-", "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns", "pod-template-hash": "64fc886fd4" }, "name": "coredns-coredns-64fc886fd4-clwtn", "namespace": "cnf-default", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-coredns-64fc886fd4", "uid": "089c856e-30f5-4de8-8846-ea764921a48a" } ], "resourceVersion": "4961733", "uid": "1493bcca-c392-4f42-8125-d050b7590390" }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" }, { "name": "kube-api-access-fkffz", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:48Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:59Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:45Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image": "docker.io/coredns/coredns:1.7.1", "imageID": "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:47Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-fkffz", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.177", "podIPs": [ { "ip": "10.244.1.177" } ], "qosClass": "Guaranteed", "startTime": "2025-03-06T11:53:45Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-mh426", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961311", "uid": "95aa40ad-9e0e-486b-a5d0-41f9194fd651" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-9vvm7", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:35Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://39cb674f43c076ff30aa358159b31e506541ff4c104310aa1df3a9b440d9accc", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-9vvm7", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:52:32Z", "generateName": "cluster-tools-", "labels": { "controller-revision-hash": "565c4f9947", "name": "cluster-tools", "pod-template-generation": "1" }, "name": "cluster-tools-vg86b", "namespace": "cnf-testsuite", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "cluster-tools", "uid": "76a4ac07-175e-48d4-bd2a-be80b22f00b8" } ], "resourceVersion": "4961309", "uid": "c163624b-e2b0-462b-bb0a-34fe5551b1fa" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "args": [ "-c", "sleep infinity" ], "command": [ "/bin/sh" ], "image": "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy": "Always", "name": "cluster-tools", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirstWithHostNet", "enableServiceLinks": true, "hostNetwork": true, "hostPID": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/var/run/containerd/", "type": "" }, "name": "containerd-volume" }, { "hostPath": { "path": "/proc", "type": "" }, "name": "proc" }, { "hostPath": { "path": "/run/dockershim.sock", "type": "" }, "name": "dockerd-volume" }, { "hostPath": { "path": "/run/systemd", "type": "" }, "name": "systemd" }, { "name": "kube-api-access-lq7ml", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:34Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:52:32Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image": "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID": "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState": {}, "name": "cluster-tools", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:52:34Z" } }, "volumeMounts": [ { "mountPath": "/run/containerd/", "name": "containerd-volume" }, { "mountPath": "/run/systemd/", "name": "systemd", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/proc", "name": "proc" }, { "mountPath": "/run/dockershim.sock", "name": "dockerd-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lq7ml", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:52:32Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-7th7s", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "554", "uid": "e8cdf891-c99d-456e-97a1-587cd1464f6a" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-w78pj", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bbc590bbcd8589db9998828bcf457817a5861b77117b3154f43b52f0d484c509", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-w78pj", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.2", "podIPs": [ { "ip": "10.244.0.2" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "coredns-668d6bf9bc-", "labels": { "k8s-app": "kube-dns", "pod-template-hash": "668d6bf9bc" }, "name": "coredns-668d6bf9bc-nh5jq", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "coredns-668d6bf9bc", "uid": "b728ed34-04a6-467f-a82a-d10ebf7bca35" } ], "resourceVersion": "558", "uid": "6cb7a212-fae9-4286-a247-4fdedccaaef0" }, "spec": { "affinity": { "podAntiAffinity": { "preferredDuringSchedulingIgnoredDuringExecution": [ { "podAffinityTerm": { "labelSelector": { "matchExpressions": [ { "key": "k8s-app", "operator": "In", "values": [ "kube-dns" ] } ] }, "topologyKey": "kubernetes.io/hostname" }, "weight": 100 } ] } }, "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "dns", "protocol": "UDP" }, { "containerPort": 53, "name": "dns-tcp", "protocol": "TCP" }, { "containerPort": 9153, "name": "metrics", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 3, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 1 }, "resources": { "limits": { "memory": "170Mi" }, "requests": { "cpu": "100m", "memory": "70Mi" } }, "securityContext": { "allowPrivilegeEscalation": false, "capabilities": { "add": [ "NET_BIND_SERVICE" ], "drop": [ "ALL" ] }, "readOnlyRootFilesystem": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true } ] } ], "dnsPolicy": "Default", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000000000, "priorityClassName": "system-cluster-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "coredns", "serviceAccountName": "coredns", "terminationGracePeriodSeconds": 30, "tolerations": [ { "key": "CriticalAddonsOnly", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns" }, "name": "config-volume" }, { "name": "kube-api-access-rvldr", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:32Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://04949db0f64983f4e05a520c1e5ec2e4f18d20696b449f914b932cdb5f65ea4e", "image": "registry.k8s.io/coredns/coredns:v1.11.3", "imageID": "sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6", "lastState": {}, "name": "coredns", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:32Z" } }, "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rvldr", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.3", "podIPs": [ { "ip": "10.244.0.3" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:29Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-5d7tp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "604", "uid": "740809cc-4bf8-40e5-a556-d39f5cf1ff03" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-wpwg9", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:41Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://061be807ad7316af99efdac29530bac9e59bc8b1f44bfa9d732524ff94096870", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:40Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-wpwg9", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "10.244.2.2", "podIPs": [ { "ip": "10.244.2.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-q7fmz", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "610", "uid": "064549ca-14e3-4970-b40f-29de7cfe116f" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-l5xt5", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:42Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:42Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-l5xt5", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.2", "podIPs": [ { "ip": "10.244.1.2" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:22Z", "generateName": "create-loop-devs-", "labels": { "controller-revision-hash": "d47c864c9", "name": "create-loop-devs", "pod-template-generation": "1" }, "name": "create-loop-devs-qnxv9", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "create-loop-devs", "uid": "0c9d06dd-32e7-495f-ae06-c55e4286129c" } ], "resourceVersion": "570", "uid": "b06ba4c2-135f-409c-a6c2-97a8f3b9e3b8" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n" ], "image": "alpine:3.6", "imagePullPolicy": "IfNotPresent", "name": "loopdev", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/dev", "type": "" }, "name": "dev" }, { "name": "kube-api-access-nbkfh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://c51af2d0904be4a04d18610d9e22180527040313394a8593a6440153ecc95b6c", "image": "docker.io/library/alpine:3.6", "imageID": "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState": {}, "name": "loopdev", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/dev", "name": "dev" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nbkfh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.5", "podIPs": [ { "ip": "10.244.0.5" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:22Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/etcd.advertise-client-urls": "https://172.24.0.10:2379", "kubernetes.io/config.hash": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.mirror": "cb5d29ba77f7dffc969fb37ed860df0e", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611037602Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "etcd", "tier": "control-plane" }, "name": "etcd-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "449", "uid": "98c96fcf-ed18-4a6f-b3f5-11b8d31cd7e3" }, "spec": { "containers": [ { "command": [ "etcd", "--advertise-client-urls=https://172.24.0.10:2379", "--cert-file=/etc/kubernetes/pki/etcd/server.crt", "--client-cert-auth=true", "--data-dir=/var/lib/etcd", "--experimental-initial-corrupt-check=true", "--experimental-watch-progress-notify-interval=5s", "--initial-advertise-peer-urls=https://172.24.0.10:2380", "--initial-cluster=v132-control-plane=https://172.24.0.10:2380", "--key-file=/etc/kubernetes/pki/etcd/server.key", "--listen-client-urls=https://127.0.0.1:2379,https://172.24.0.10:2379", "--listen-metrics-urls=http://127.0.0.1:2381", "--listen-peer-urls=https://172.24.0.10:2380", "--name=v132-control-plane", "--peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt", "--peer-client-cert-auth=true", "--peer-key-file=/etc/kubernetes/pki/etcd/peer.key", "--peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt", "--snapshot-count=10000", "--trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt" ], "image": "registry.k8s.io/etcd:3.5.16-0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "etcd", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m", "memory": "100Mi" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 2381, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/etcd", "name": "etcd-data" }, { "mountPath": "/etc/kubernetes/pki/etcd", "name": "etcd-certs" } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/pki/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-certs" }, { "hostPath": { "path": "/var/lib/etcd", "type": "DirectoryOrCreate" }, "name": "etcd-data" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1266accf9cb2077e3a1860494d892851f5841cea1ec635f48f86e6dbcd71fe47", "image": "registry.k8s.io/etcd:3.5.16-0", "imageID": "sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc", "lastState": {}, "name": "etcd", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:02Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-4s8ph", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "509", "uid": "0f87ae31-f6df-43d6-b42a-0236e849318a" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-5p2rs", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://ec0087742f70884623637b510ea819cf4c80f77c85101317f003eef9398d7239", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:26Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-5p2rs", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-kj9qx", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "403", "uid": "d57bb953-a274-4ab3-9e0d-ecd30b29e177" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-nr2vp", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://1362ecf39e68b6fcb5d110ef41d930a7b64769ca50cbf9c7a27b54a19818768e", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:18Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-nr2vp", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kindnet-", "labels": { "app": "kindnet", "controller-revision-hash": "64d87c4fdd", "k8s-app": "kindnet", "pod-template-generation": "1", "tier": "node" }, "name": "kindnet-n2gsh", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kindnet", "uid": "dbe3c81f-b1df-4801-9788-76a8bdb5ae88" } ], "resourceVersion": "510", "uid": "4a823046-cae0-4bb3-936a-64a078683298" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "env": [ { "name": "HOST_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.hostIP" } } }, { "name": "POD_IP", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "status.podIP" } } }, { "name": "POD_SUBNET", "value": "10.244.0.0/16" }, { "name": "CONTROL_PLANE_ENDPOINT", "value": "v132-control-plane:6443" } ], "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy": "IfNotPresent", "name": "kindnet-cni", "resources": { "limits": { "cpu": "100m", "memory": "50Mi" }, "requests": { "cpu": "100m", "memory": "50Mi" } }, "securityContext": { "capabilities": { "add": [ "NET_RAW", "NET_ADMIN" ] }, "privileged": false }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kindnet", "serviceAccountName": "kindnet", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/cni/net.d", "type": "" }, "name": "cni-cfg" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-rz5cn", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:26Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image": "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID": "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState": {}, "name": "kindnet-cni", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:25Z" } }, "volumeMounts": [ { "mountPath": "/etc/cni/net.d", "name": "cni-cfg" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-rz5cn", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "Guaranteed", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint": "172.24.0.10:6443", "kubernetes.io/config.hash": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.mirror": "9285c6bc1556b802f2c5c03b75e1bbc2", "kubernetes.io/config.seen": "2025-01-31T08:08:56.789406878Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:06Z", "labels": { "component": "kube-apiserver", "tier": "control-plane" }, "name": "kube-apiserver-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "325", "uid": "55badffb-46f4-4ed0-a515-3da36c21bd5a" }, "spec": { "containers": [ { "command": [ "kube-apiserver", "--admission-control-config-file=/etc/config/cluster-level-pss.yaml", "--advertise-address=172.24.0.10", "--allow-privileged=true", "--authorization-mode=Node,RBAC", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--enable-admission-plugins=NodeRestriction", "--enable-bootstrap-token-auth=true", "--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt", "--etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt", "--etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key", "--etcd-servers=https://127.0.0.1:2379", "--kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt", "--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key", "--kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname", "--proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt", "--proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key", "--requestheader-allowed-names=front-proxy-client", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--requestheader-extra-headers-prefix=X-Remote-Extra-", "--requestheader-group-headers=X-Remote-Group", "--requestheader-username-headers=X-Remote-User", "--runtime-config=", "--secure-port=6443", "--service-account-issuer=https://kubernetes.default.svc.cluster.local", "--service-account-key-file=/etc/kubernetes/pki/sa.pub", "--service-account-signing-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--tls-cert-file=/etc/kubernetes/pki/apiserver.crt", "--tls-private-key-file=/etc/kubernetes/pki/apiserver.key" ], "image": "registry.k8s.io/kube-apiserver:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-apiserver", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "172.24.0.10", "path": "/readyz", "port": 6443, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "250m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "172.24.0.10", "path": "/livez", "port": 6443, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config", "name": "accf" }, { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/config", "type": "DirectoryOrCreate" }, "name": "accf" }, { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://50cc956fc6710605bf5590a3e46c5ef522807457c265c264f180f00cfc296625", "image": "registry.k8s.io/kube-apiserver-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:13c22f71929612938f13aa49a5498305ffb29ccba9dc9c7b16caf4f367eab740", "lastState": {}, "name": "kube-apiserver", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.mirror": "a234a5c8d21020068ad41e2731d25afb", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611034585Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-controller-manager", "tier": "control-plane" }, "name": "kube-controller-manager-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "457", "uid": "6087f159-3f81-44a8-8c58-4530c3060568" }, "spec": { "containers": [ { "command": [ "kube-controller-manager", "--allocate-node-cidrs=true", "--authentication-kubeconfig=/etc/kubernetes/controller-manager.conf", "--authorization-kubeconfig=/etc/kubernetes/controller-manager.conf", "--bind-address=127.0.0.1", "--client-ca-file=/etc/kubernetes/pki/ca.crt", "--cluster-cidr=10.244.0.0/16", "--cluster-name=v132", "--cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt", "--cluster-signing-key-file=/etc/kubernetes/pki/ca.key", "--controllers=*,bootstrapsigner,tokencleaner", "--enable-hostpath-provisioner=true", "--kubeconfig=/etc/kubernetes/controller-manager.conf", "--leader-elect=true", "--requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt", "--root-ca-file=/etc/kubernetes/pki/ca.crt", "--service-account-private-key-file=/etc/kubernetes/pki/sa.key", "--service-cluster-ip-range=10.96.0.0/16", "--use-service-account-credentials=true" ], "image": "registry.k8s.io/kube-controller-manager:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-controller-manager", "resources": { "requests": { "cpu": "200m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/healthz", "port": 10257, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/ssl/certs", "name": "ca-certs", "readOnly": true }, { "mountPath": "/etc/ca-certificates", "name": "etc-ca-certificates", "readOnly": true }, { "mountPath": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "name": "flexvolume-dir" }, { "mountPath": "/etc/kubernetes/pki", "name": "k8s-certs", "readOnly": true }, { "mountPath": "/etc/kubernetes/controller-manager.conf", "name": "kubeconfig", "readOnly": true }, { "mountPath": "/usr/local/share/ca-certificates", "name": "usr-local-share-ca-certificates", "readOnly": true }, { "mountPath": "/usr/share/ca-certificates", "name": "usr-share-ca-certificates", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/ssl/certs", "type": "DirectoryOrCreate" }, "name": "ca-certs" }, { "hostPath": { "path": "/etc/ca-certificates", "type": "DirectoryOrCreate" }, "name": "etc-ca-certificates" }, { "hostPath": { "path": "/usr/libexec/kubernetes/kubelet-plugins/volume/exec", "type": "DirectoryOrCreate" }, "name": "flexvolume-dir" }, { "hostPath": { "path": "/etc/kubernetes/pki", "type": "DirectoryOrCreate" }, "name": "k8s-certs" }, { "hostPath": { "path": "/etc/kubernetes/controller-manager.conf", "type": "FileOrCreate" }, "name": "kubeconfig" }, { "hostPath": { "path": "/usr/local/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-local-share-ca-certificates" }, { "hostPath": { "path": "/usr/share/ca-certificates", "type": "DirectoryOrCreate" }, "name": "usr-share-ca-certificates" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7ec790ca5d6099f7105d0fcafced11ef34183166a55a5e5439c8702ab4ce2962", "image": "registry.k8s.io/kube-controller-manager-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:b7935d8402c92c8714ccb54b3fe1b169feecc70af79c0f54a9838375869310bf", "lastState": {}, "name": "kube-controller-manager", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-dkr2j", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "500", "uid": "14b0603b-2896-496e-84e3-572ff7452828" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq7d2", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:20Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:25Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7170acacca485a371f1875c541695dd6a294e952139dfb57273ba1b55be140cd", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:24Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq7d2", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.9", "hostIPs": [ { "ip": "172.24.0.9" } ], "phase": "Running", "podIP": "172.24.0.9", "podIPs": [ { "ip": "172.24.0.9" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:20Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:13Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-k7lcp", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "384", "uid": "5ab0230a-25d6-4060-bc00-a54f5f07b579" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-control-plane" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-sq48x", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:16Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:13Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://cf70e4502bebe4b0fe4bf2d54a073141044c0ad39fa17621c83a0a269074b5cb", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:16Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-sq48x", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:13Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:18Z", "generateName": "kube-proxy-", "labels": { "controller-revision-hash": "64b9dbc74b", "k8s-app": "kube-proxy", "pod-template-generation": "1" }, "name": "kube-proxy-ssh49", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "DaemonSet", "name": "kube-proxy", "uid": "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf" } ], "resourceVersion": "465", "uid": "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005" }, "spec": { "affinity": { "nodeAffinity": { "requiredDuringSchedulingIgnoredDuringExecution": { "nodeSelectorTerms": [ { "matchFields": [ { "key": "metadata.name", "operator": "In", "values": [ "v132-worker2" ] } ] } ] } } }, "containers": [ { "command": [ "/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)" ], "env": [ { "name": "NODE_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "spec.nodeName" } } } ], "image": "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy": "IfNotPresent", "name": "kube-proxy", "resources": {}, "securityContext": { "privileged": true }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "kube-proxy", "serviceAccountName": "kube-proxy", "terminationGracePeriodSeconds": 30, "tolerations": [ { "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists" }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/disk-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/memory-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/pid-pressure", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/unschedulable", "operator": "Exists" }, { "effect": "NoSchedule", "key": "node.kubernetes.io/network-unavailable", "operator": "Exists" } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "kube-proxy" }, "name": "kube-proxy" }, { "hostPath": { "path": "/run/xtables.lock", "type": "FileOrCreate" }, "name": "xtables-lock" }, { "hostPath": { "path": "/lib/modules", "type": "" }, "name": "lib-modules" }, { "name": "kube-api-access-8qzxh", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:22Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image": "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState": {}, "name": "kube-proxy", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:21Z" } }, "volumeMounts": [ { "mountPath": "/var/lib/kube-proxy", "name": "kube-proxy" }, { "mountPath": "/run/xtables.lock", "name": "xtables-lock" }, { "mountPath": "/lib/modules", "name": "lib-modules", "readOnly": true, "recursiveReadOnly": "Disabled" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-8qzxh", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "172.24.0.8", "podIPs": [ { "ip": "172.24.0.8" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:19Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "annotations": { "kubernetes.io/config.hash": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.mirror": "d96c731e2381323806dbd1742ea3253f", "kubernetes.io/config.seen": "2025-01-31T08:09:08.611035903Z", "kubernetes.io/config.source": "file" }, "creationTimestamp": "2025-01-31T08:09:08Z", "labels": { "component": "kube-scheduler", "tier": "control-plane" }, "name": "kube-scheduler-v132-control-plane", "namespace": "kube-system", "ownerReferences": [ { "apiVersion": "v1", "controller": true, "kind": "Node", "name": "v132-control-plane", "uid": "e3a8ca14-2d88-4785-a327-522fe918366a" } ], "resourceVersion": "444", "uid": "5b0261cd-89a1-46a4-97b3-f87aadbe4002" }, "spec": { "containers": [ { "command": [ "kube-scheduler", "--authentication-kubeconfig=/etc/kubernetes/scheduler.conf", "--authorization-kubeconfig=/etc/kubernetes/scheduler.conf", "--bind-address=127.0.0.1", "--kubeconfig=/etc/kubernetes/scheduler.conf", "--leader-elect=true" ], "image": "registry.k8s.io/kube-scheduler:v1.32.0", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 8, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "name": "kube-scheduler", "readinessProbe": { "failureThreshold": 3, "httpGet": { "host": "127.0.0.1", "path": "/readyz", "port": 10259, "scheme": "HTTPS" }, "periodSeconds": 1, "successThreshold": 1, "timeoutSeconds": 15 }, "resources": { "requests": { "cpu": "100m" } }, "startupProbe": { "failureThreshold": 24, "httpGet": { "host": "127.0.0.1", "path": "/livez", "port": 10259, "scheme": "HTTPS" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 15 }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/kubernetes/scheduler.conf", "name": "kubeconfig", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "hostNetwork": true, "nodeName": "v132-control-plane", "preemptionPolicy": "PreemptLowerPriority", "priority": 2000001000, "priorityClassName": "system-node-critical", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": { "seccompProfile": { "type": "RuntimeDefault" } }, "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "operator": "Exists" } ], "volumes": [ { "hostPath": { "path": "/etc/kubernetes/scheduler.conf", "type": "FileOrCreate" }, "name": "kubeconfig" } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:19Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:08Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://90f1c50f4638844b8e646c5211dace4db0850a3a87920cb70f11ea389d71101b", "image": "registry.k8s.io/kube-scheduler-amd64:v1.32.0", "imageID": "docker.io/library/import-2024-12-13@sha256:cf3585ecaad44db4bd25b0ffe2ff5ecf188eaf112b261ca4cb0bfa9e4a979ebe", "lastState": {}, "name": "kube-scheduler", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:01Z" } } } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "172.24.0.10", "podIPs": [ { "ip": "172.24.0.10" } ], "qosClass": "Burstable", "startTime": "2025-01-31T08:09:08Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-03-06T11:53:18Z", "generateName": "chaos-operator-ce-7d9fdb77d5-", "labels": { "app.kubernetes.io/component": "operator", "app.kubernetes.io/managed-by": "kubectl", "app.kubernetes.io/name": "litmus", "app.kubernetes.io/part-of": "litmus", "app.kubernetes.io/version": "v3.6.0", "name": "chaos-operator", "pod-template-hash": "7d9fdb77d5" }, "name": "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace": "litmus", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "chaos-operator-ce-7d9fdb77d5", "uid": "285fcd9f-a950-48a9-9f22-8ccd982a02dd" } ], "resourceVersion": "4961565", "uid": "ee9767f8-1757-4222-a67b-92ea555912b8" }, "spec": { "containers": [ { "args": [ "-leader-elect=true" ], "command": [ "chaos-operator" ], "env": [ { "name": "CHAOS_RUNNER_IMAGE", "value": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0" }, { "name": "WATCH_NAMESPACE" }, { "name": "POD_NAME", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.name" } } }, { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "OPERATOR_NAME", "value": "chaos-operator" } ], "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy": "Always", "name": "chaos-operator", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-worker2", "nodeSelector": { "kubernetes.io/hostname": "v132-worker2" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "litmus", "serviceAccountName": "litmus", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "name": "kube-api-access-lw78t", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:20Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-03-06T11:53:18Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID": "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState": {}, "name": "chaos-operator", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-03-06T11:53:20Z" } }, "volumeMounts": [ { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-lw78t", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.8", "hostIPs": [ { "ip": "172.24.0.8" } ], "phase": "Running", "podIP": "10.244.1.174", "podIPs": [ { "ip": "10.244.1.174" } ], "qosClass": "BestEffort", "startTime": "2025-03-06T11:53:18Z" } }, { "apiVersion": "v1", "kind": "Pod", "metadata": { "creationTimestamp": "2025-01-31T08:09:14Z", "generateName": "local-path-provisioner-58cc7856b6-", "labels": { "app": "local-path-provisioner", "pod-template-hash": "58cc7856b6" }, "name": "local-path-provisioner-58cc7856b6-xpr8d", "namespace": "local-path-storage", "ownerReferences": [ { "apiVersion": "apps/v1", "blockOwnerDeletion": true, "controller": true, "kind": "ReplicaSet", "name": "local-path-provisioner-58cc7856b6", "uid": "0c261657-b967-46e5-ae7d-19e90e813363" } ], "resourceVersion": "572", "uid": "f70efa34-43ee-49b2-8d40-494399374974" }, "spec": { "containers": [ { "command": [ "local-path-provisioner", "--debug", "start", "--helper-image", "docker.io/kindest/local-path-helper:v20241212-8ac705d0", "--config", "/etc/config/config.json" ], "env": [ { "name": "POD_NAMESPACE", "valueFrom": { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" } } }, { "name": "CONFIG_MOUNT_PATH", "value": "/etc/config/" } ], "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imagePullPolicy": "IfNotPresent", "name": "local-path-provisioner", "resources": {}, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true } ] } ], "dnsPolicy": "ClusterFirst", "enableServiceLinks": true, "nodeName": "v132-control-plane", "nodeSelector": { "kubernetes.io/os": "linux" }, "preemptionPolicy": "PreemptLowerPriority", "priority": 0, "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "local-path-provisioner-service-account", "serviceAccountName": "local-path-provisioner-service-account", "terminationGracePeriodSeconds": 30, "tolerations": [ { "effect": "NoSchedule", "key": "node-role.kubernetes.io/control-plane", "operator": "Equal" }, { "effect": "NoSchedule", "key": "node-role.kubernetes.io/master", "operator": "Equal" }, { "effect": "NoExecute", "key": "node.kubernetes.io/not-ready", "operator": "Exists", "tolerationSeconds": 300 }, { "effect": "NoExecute", "key": "node.kubernetes.io/unreachable", "operator": "Exists", "tolerationSeconds": 300 } ], "volumes": [ { "configMap": { "defaultMode": 420, "name": "local-path-config" }, "name": "config-volume" }, { "name": "kube-api-access-2lbmq", "projected": { "defaultMode": 420, "sources": [ { "serviceAccountToken": { "expirationSeconds": 3607, "path": "token" } }, { "configMap": { "items": [ { "key": "ca.crt", "path": "ca.crt" } ], "name": "kube-root-ca.crt" } }, { "downwardAPI": { "items": [ { "fieldRef": { "apiVersion": "v1", "fieldPath": "metadata.namespace" }, "path": "namespace" } ] } } ] } } ] }, "status": { "conditions": [ { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "PodReadyToStartContainers" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "Initialized" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "Ready" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:33Z", "status": "True", "type": "ContainersReady" }, { "lastProbeTime": null, "lastTransitionTime": "2025-01-31T08:09:29Z", "status": "True", "type": "PodScheduled" } ], "containerStatuses": [ { "containerID": "containerd://7da102f3f5692c027238642b38f25b6acd34eda949a0b14a0f3c29f0933aeac6", "image": "docker.io/kindest/local-path-provisioner:v20241212-8ac705d0", "imageID": "sha256:04b7d0b91e7e514a13892f539330df607343a12ef344d7337f10a975e53cd01a", "lastState": {}, "name": "local-path-provisioner", "ready": true, "restartCount": 0, "started": true, "state": { "running": { "startedAt": "2025-01-31T08:09:33Z" } }, "volumeMounts": [ { "mountPath": "/etc/config/", "name": "config-volume" }, { "mountPath": "/var/run/secrets/kubernetes.io/serviceaccount", "name": "kube-api-access-2lbmq", "readOnly": true, "recursiveReadOnly": "Disabled" } ] } ], "hostIP": "172.24.0.10", "hostIPs": [ { "ip": "172.24.0.10" } ], "phase": "Running", "podIP": "10.244.0.4", "podIPs": [ { "ip": "10.244.0.4" } ], "qosClass": "BestEffort", "startTime": "2025-01-31T08:09:29Z" } } ], "kind": "List", "metadata": { "resourceVersion": "" } } D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}, "creationTimestamp" => "2025-03-06T11:53:44Z", "generateName" => "coredns-coredns-64fc886fd4-", "labels" => {"app.kubernetes.io/instance" => "coredns", "app.kubernetes.io/name" => "coredns", "k8s-app" => "coredns", "pod-template-hash" => "64fc886fd4"}, "name" => "coredns-coredns-64fc886fd4-clwtn", "namespace" => "cnf-default", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "coredns-coredns-64fc886fd4", "uid" => "089c856e-30f5-4de8-8846-ea764921a48a"}], "resourceVersion" => "4961733", "uid" => "1493bcca-c392-4f42-8125-d050b7590390"}, "spec" => {"containers" => [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true}]}], "dnsPolicy" => "Default", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}, {"name" => "kube-api-access-fkffz", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:48Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:59Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:45Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://8ea7a033d5ed83ee22659a38858e193c801205274b6e6d49b5fa345bfcd81782", "image" => "docker.io/coredns/coredns:1.7.1", "imageID" => "docker.io/coredns/coredns@sha256:4a6e0769130686518325b21b0c1d0688b54e7c79244d48e1b15634e98e40c6ef", "lastState" => {}, "name" => "coredns", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:47Z"}}, "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-fkffz", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.177", "podIPs" => [{"ip" => "10.244.1.177"}], "qosClass" => "Guaranteed", "startTime" => "2025-03-06T11:53:45Z"}} D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: PodName: coredns-coredns-64fc886fd4-clwtn D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: PodName: cluster-tools-vg86b D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:22Z", "generateName" => "create-loop-devs-", "labels" => {"controller-revision-hash" => "d47c864c9", "name" => "create-loop-devs", "pod-template-generation" => "1"}, "name" => "create-loop-devs-q7fmz", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "create-loop-devs", "uid" => "0c9d06dd-32e7-495f-ae06-c55e4286129c"}], "resourceVersion" => "610", "uid" => "064549ca-14e3-4970-b40f-29de7cfe116f"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["sh", "-c", "while true; do\n for i in $(seq 0 1000); do\n if ! [ -e /dev/loop$i ]; then\n mknod /dev/loop$i c 7 $i\n fi\n done\n sleep 100000000\ndone\n"], "image" => "alpine:3.6", "imagePullPolicy" => "IfNotPresent", "name" => "loopdev", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoSchedule", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/dev", "type" => ""}, "name" => "dev"}, {"name" => "kube-api-access-l5xt5", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:42Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://bf0b5828de8cfff41f79400b9773306dbbf648cb2976e3f3d5c8546ae5cbca73", "image" => "docker.io/library/alpine:3.6", "imageID" => "docker.io/library/alpine@sha256:66790a2b79e1ea3e1dabac43990c54aca5d1ddf268d9a5a0285e4167c8b24475", "lastState" => {}, "name" => "loopdev", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:42Z"}}, "volumeMounts" => [{"mountPath" => "/dev", "name" => "dev"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-l5xt5", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.2", "podIPs" => [{"ip" => "10.244.1.2"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:22Z"}} D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: PodName: create-loop-devs-q7fmz D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kindnet-", "labels" => {"app" => "kindnet", "controller-revision-hash" => "64d87c4fdd", "k8s-app" => "kindnet", "pod-template-generation" => "1", "tier" => "node"}, "name" => "kindnet-n2gsh", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kindnet", "uid" => "dbe3c81f-b1df-4801-9788-76a8bdb5ae88"}], "resourceVersion" => "510", "uid" => "4a823046-cae0-4bb3-936a-64a078683298"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"env" => [{"name" => "HOST_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.hostIP"}}}, {"name" => "POD_IP", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "status.podIP"}}}, {"name" => "POD_SUBNET", "value" => "10.244.0.0/16"}, {"name" => "CONTROL_PLANE_ENDPOINT", "value" => "v132-control-plane:6443"}], "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imagePullPolicy" => "IfNotPresent", "name" => "kindnet-cni", "resources" => {"limits" => {"cpu" => "100m", "memory" => "50Mi"}, "requests" => {"cpu" => "100m", "memory" => "50Mi"}}, "securityContext" => {"capabilities" => {"add" => ["NET_RAW", "NET_ADMIN"]}, "privileged" => false}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kindnet", "serviceAccountName" => "kindnet", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/etc/cni/net.d", "type" => ""}, "name" => "cni-cfg"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-rz5cn", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:26Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://511ebfd56c963f52e7c92e848775e495c8965c2d71655a9a8e6cac51dd9b1c32", "image" => "docker.io/kindest/kindnetd:v20241212-9f82dd49", "imageID" => "sha256:d300845f67aebd4f27f549889087215f476cecdd6d9a715b49a4152857549c56", "lastState" => {}, "name" => "kindnet-cni", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:25Z"}}, "volumeMounts" => [{"mountPath" => "/etc/cni/net.d", "name" => "cni-cfg"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-rz5cn", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "Guaranteed", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: PodName: kindnet-n2gsh D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-01-31T08:09:18Z", "generateName" => "kube-proxy-", "labels" => {"controller-revision-hash" => "64b9dbc74b", "k8s-app" => "kube-proxy", "pod-template-generation" => "1"}, "name" => "kube-proxy-ssh49", "namespace" => "kube-system", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "kube-proxy", "uid" => "3bd38cf6-1ff8-44a5-8759-66ddd18a24bf"}], "resourceVersion" => "465", "uid" => "59a4ea1a-c2a6-4c2f-ae8c-fb1dc6be7005"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"command" => ["/usr/local/bin/kube-proxy", "--config=/var/lib/kube-proxy/config.conf", "--hostname-override=$(NODE_NAME)"], "env" => [{"name" => "NODE_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "spec.nodeName"}}}], "image" => "registry.k8s.io/kube-proxy:v1.32.0", "imagePullPolicy" => "IfNotPresent", "name" => "kube-proxy", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "hostNetwork" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/os" => "linux"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 2000001000, "priorityClassName" => "system-node-critical", "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "kube-proxy", "serviceAccountName" => "kube-proxy", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"configMap" => {"defaultMode" => 420, "name" => "kube-proxy"}, "name" => "kube-proxy"}, {"hostPath" => {"path" => "/run/xtables.lock", "type" => "FileOrCreate"}, "name" => "xtables-lock"}, {"hostPath" => {"path" => "/lib/modules", "type" => ""}, "name" => "lib-modules"}, {"name" => "kube-api-access-8qzxh", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:19Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:22Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-01-31T08:09:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://37ffbbd8402ba476cacd59b940798da3eac1303ac204a0052ed88607f57f86b9", "image" => "registry.k8s.io/kube-proxy-amd64:v1.32.0", "imageID" => "docker.io/library/import-2024-12-13@sha256:ed1f5d5b7be94a17cafd05b4b63acaca01e8f9bf6cb864d8eeb7be6da52c7c6e", "lastState" => {}, "name" => "kube-proxy", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-01-31T08:09:21Z"}}, "volumeMounts" => [{"mountPath" => "/var/lib/kube-proxy", "name" => "kube-proxy"}, {"mountPath" => "/run/xtables.lock", "name" => "xtables-lock"}, {"mountPath" => "/lib/modules", "name" => "lib-modules", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-8qzxh", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-01-31T08:09:19Z"}} D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: PodName: kube-proxy-ssh49 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:53:18Z", "generateName" => "chaos-operator-ce-7d9fdb77d5-", "labels" => {"app.kubernetes.io/component" => "operator", "app.kubernetes.io/managed-by" => "kubectl", "app.kubernetes.io/name" => "litmus", "app.kubernetes.io/part-of" => "litmus", "app.kubernetes.io/version" => "v3.6.0", "name" => "chaos-operator", "pod-template-hash" => "7d9fdb77d5"}, "name" => "chaos-operator-ce-7d9fdb77d5-m65r6", "namespace" => "litmus", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "ReplicaSet", "name" => "chaos-operator-ce-7d9fdb77d5", "uid" => "285fcd9f-a950-48a9-9f22-8ccd982a02dd"}], "resourceVersion" => "4961565", "uid" => "ee9767f8-1757-4222-a67b-92ea555912b8"}, "spec" => {"containers" => [{"args" => ["-leader-elect=true"], "command" => ["chaos-operator"], "env" => [{"name" => "CHAOS_RUNNER_IMAGE", "value" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-runner:3.6.0"}, {"name" => "WATCH_NAMESPACE"}, {"name" => "POD_NAME", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.name"}}}, {"name" => "POD_NAMESPACE", "valueFrom" => {"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}}}, {"name" => "OPERATOR_NAME", "value" => "chaos-operator"}], "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imagePullPolicy" => "Always", "name" => "chaos-operator", "resources" => {}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirst", "enableServiceLinks" => true, "nodeName" => "v132-worker2", "nodeSelector" => {"kubernetes.io/hostname" => "v132-worker2"}, "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "litmus", "serviceAccountName" => "litmus", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists", "tolerationSeconds" => 300}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists", "tolerationSeconds" => 300}], "volumes" => [{"name" => "kube-api-access-lw78t", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:20Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:53:18Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://03e9be31e81c73a2dc8b0c8b94e7b30a3fc523dac921d3035bff32a251ef3387", "image" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator:3.6.0", "imageID" => "litmuschaos.docker.scarf.sh/litmuschaos/chaos-operator@sha256:f37e85afc0412a47d1e028e5f86b6cc3a8cbbfe59369beba0af5401aa47dfd63", "lastState" => {}, "name" => "chaos-operator", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:53:20Z"}}, "volumeMounts" => [{"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lw78t", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "10.244.1.174", "podIPs" => [{"ip" => "10.244.1.174"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:53:18Z"}} D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: PodName: chaos-operator-ce-7d9fdb77d5-m65r6 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: spec node_name: No Match: v132-worker2 D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: pods_by_label D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: pod: {"apiVersion" => "v1", "kind" => "Pod", "metadata" => {"creationTimestamp" => "2025-03-06T11:52:32Z", "generateName" => "cluster-tools-", "labels" => {"controller-revision-hash" => "565c4f9947", "name" => "cluster-tools", "pod-template-generation" => "1"}, "name" => "cluster-tools-vg86b", "namespace" => "cnf-testsuite", "ownerReferences" => [{"apiVersion" => "apps/v1", "blockOwnerDeletion" => true, "controller" => true, "kind" => "DaemonSet", "name" => "cluster-tools", "uid" => "76a4ac07-175e-48d4-bd2a-be80b22f00b8"}], "resourceVersion" => "4961309", "uid" => "c163624b-e2b0-462b-bb0a-34fe5551b1fa"}, "spec" => {"affinity" => {"nodeAffinity" => {"requiredDuringSchedulingIgnoredDuringExecution" => {"nodeSelectorTerms" => [{"matchFields" => [{"key" => "metadata.name", "operator" => "In", "values" => ["v132-worker2"]}]}]}}}, "containers" => [{"args" => ["-c", "sleep infinity"], "command" => ["/bin/sh"], "image" => "lfncnti/cluster-tools:v1.0.6", "imagePullPolicy" => "Always", "name" => "cluster-tools", "resources" => {}, "securityContext" => {"privileged" => true}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true}]}], "dnsPolicy" => "ClusterFirstWithHostNet", "enableServiceLinks" => true, "hostNetwork" => true, "hostPID" => true, "nodeName" => "v132-worker2", "preemptionPolicy" => "PreemptLowerPriority", "priority" => 0, "restartPolicy" => "Always", "schedulerName" => "default-scheduler", "securityContext" => {}, "serviceAccount" => "default", "serviceAccountName" => "default", "terminationGracePeriodSeconds" => 30, "tolerations" => [{"effect" => "NoExecute", "key" => "node.kubernetes.io/not-ready", "operator" => "Exists"}, {"effect" => "NoExecute", "key" => "node.kubernetes.io/unreachable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/disk-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/memory-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/pid-pressure", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/unschedulable", "operator" => "Exists"}, {"effect" => "NoSchedule", "key" => "node.kubernetes.io/network-unavailable", "operator" => "Exists"}], "volumes" => [{"hostPath" => {"path" => "/var/run/containerd/", "type" => ""}, "name" => "containerd-volume"}, {"hostPath" => {"path" => "/proc", "type" => ""}, "name" => "proc"}, {"hostPath" => {"path" => "/run/dockershim.sock", "type" => ""}, "name" => "dockerd-volume"}, {"hostPath" => {"path" => "/run/systemd", "type" => ""}, "name" => "systemd"}, {"name" => "kube-api-access-lq7ml", "projected" => {"defaultMode" => 420, "sources" => [{"serviceAccountToken" => {"expirationSeconds" => 3607, "path" => "token"}}, {"configMap" => {"items" => [{"key" => "ca.crt", "path" => "ca.crt"}], "name" => "kube-root-ca.crt"}}, {"downwardAPI" => {"items" => [{"fieldRef" => {"apiVersion" => "v1", "fieldPath" => "metadata.namespace"}, "path" => "namespace"}]}}]}}]}, "status" => {"conditions" => [{"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "PodReadyToStartContainers"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "Initialized"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "Ready"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:34Z", "status" => "True", "type" => "ContainersReady"}, {"lastProbeTime" => nil, "lastTransitionTime" => "2025-03-06T11:52:32Z", "status" => "True", "type" => "PodScheduled"}], "containerStatuses" => [{"containerID" => "containerd://55ed30cfd85df628703e9799c00cca04f11ccac972c47c8b61b2304e12b6d336", "image" => "docker.io/lfncnti/cluster-tools:v1.0.6", "imageID" => "docker.io/lfncnti/cluster-tools@sha256:0df123115e0d3aabadcc9468bb7e85a0427cfeb8e355dba3fbcacb7d8bec8295", "lastState" => {}, "name" => "cluster-tools", "ready" => true, "restartCount" => 0, "started" => true, "state" => {"running" => {"startedAt" => "2025-03-06T11:52:34Z"}}, "volumeMounts" => [{"mountPath" => "/run/containerd/", "name" => "containerd-volume"}, {"mountPath" => "/run/systemd/", "name" => "systemd", "readOnly" => true, "recursiveReadOnly" => "Disabled"}, {"mountPath" => "/proc", "name" => "proc"}, {"mountPath" => "/run/dockershim.sock", "name" => "dockerd-volume"}, {"mountPath" => "/var/run/secrets/kubernetes.io/serviceaccount", "name" => "kube-api-access-lq7ml", "readOnly" => true, "recursiveReadOnly" => "Disabled"}]}], "hostIP" => "172.24.0.8", "hostIPs" => [{"ip" => "172.24.0.8"}], "phase" => "Running", "podIP" => "172.24.0.8", "podIPs" => [{"ip" => "172.24.0.8"}], "qosClass" => "BestEffort", "startTime" => "2025-03-06T11:52:32Z"}} D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: metadata labels: No Match cluster-tools D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: cluster_tools_pod_name: cluster-tools-vg86b D, [2025-03-06 11:58:10 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec full cli: cluster-tools-vg86b -- bash -c 'sleep 10 && kill 3113417 && sleep 5 && kill -9 3113417' I, [2025-03-06 11:58:10 UTC #1422] INFO -- cnf-testsuite: KubectlClient.exec command: kubectl exec -n cnf-testsuite cluster-tools-vg86b -- bash -c 'sleep 10 && kill 3113417 && sleep 5 && kill -9 3113417' D, [2025-03-06 11:58:25 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient.exec output: D, [2025-03-06 11:58:25 UTC #1422] DEBUG -- cnf-testsuite: ClusterTools exec: {status: Process::Status[0], output: "", error: ""} I, [2025-03-06 11:58:25 UTC #1422] INFO -- cnf-testsuite-sig_term_handled: pid_log_names: ["/tmp/3113417-strace"] ✔️ 🏆PASSED: [sig_term_handled] Sig Term handled ⚖👀 I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: pid_name: /tmp/3113417-strace I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: resp: strace: Process 3113417 attached --- SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=1, si_uid=0} --- --- SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=1, si_uid=0} --- --- SIGTERM {si_signo=SIGTERM, si_code=SI_USER, si_pid=0, si_uid=0} --- --- SIGURG {si_signo=SIGURG, si_code=SI_TKILL, si_pid=1, si_uid=0} --- +++ killed by SIGKILL +++ I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite-sig_term_handled: SigTerm Found: [true] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: yield resp: true I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite-KubectlClient::Get.resource_volumes: Service resource_name: coredns-coredns namespace: cnf-default D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: workload resource test intialized: true test_passed: true D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: task sig_term_handled emoji: ⚖👀 I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "sig_term_handled", "emoji" => "⚖👀", "tags" => ["microservice", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["microservice", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: resp: ["microservice", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_type x: microservice acc: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_points: task: sig_term_handled is worth: 100 points I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: cmd: /usr/local/bin/cnf-testsuite cert I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite-sig_term_handled: task_runtime=00:00:41.851309420; start_time=2025-03-06 11:57:48 UTC; end_time:2025-03-06 11:58:30 UTC I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "sig_term_handled", "emoji" => "⚖👀", "tags" => ["microservice", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["microservice", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: resp: ["microservice", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_type x: microservice acc: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: upsert_task: task: sig_term_handled has status: passed and is awarded: 100 points. Runtime: 00:00:41.851309420 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name reasonable_image_size D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name specialized_init_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name reasonable_startup_time D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name single_process_type D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name zombie_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name service_discovery D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name shared_database D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name sig_term_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], increase_decrease_capacity = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], node_drain = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], privileged_containers = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], non_root_containers = 0 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], cpu_limits = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], memory_limits = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], hostpath_mounts = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], container_sock_mounts = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], selinux_options = 0 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], hostport_not_used = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], latest_tag = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], log_output = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], specialized_init_system = 0 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], single_process_type = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], zombie_handled = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], sig_term_handled = 100 I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: total_points: ["microservice", "cert"] = 300 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_max_points tag: ["microservice", "cert"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name reasonable_image_size D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name specialized_init_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name reasonable_startup_time D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name single_process_type D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name zombie_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name service_discovery D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name shared_database D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name sig_term_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks - bonus tasks: 4 I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped tests [] I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: failed tests ["non_root_containers", "specialized_init_system"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name service_discovery D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_latency D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_corruption D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_duplication D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_io_stress D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name operator_installed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name secrets_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_configmap D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name no_local_volume_configuration D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name elastic_volumes D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name linux_hardening D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_file_systems D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name ingress_egress_blocked D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name prometheus_traffic D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name open_metrics D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name routed_logs D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name tracing D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: bonus tasks ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task reduce x: specialized_init_system I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) true D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_points: task: specialized_init_system is worth: 100 points I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task reduce x: single_process_type I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_points: task: single_process_type is worth: 100 points I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task reduce x: zombie_handled I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_points: task: zombie_handled is worth: 100 points I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task reduce x: sig_term_handled I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_points: task: sig_term_handled is worth: 100 points I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: total_max_points: ["microservice", "cert"] = 400 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_passed: ["microservice", "cert"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name reasonable_image_size D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name specialized_init_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name reasonable_startup_time D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name single_process_type D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name zombie_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name service_discovery D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name shared_database D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name sig_term_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], increase_decrease_capacity = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], node_drain = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], privileged_containers = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], non_root_containers = 0 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], cpu_limits = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], memory_limits = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], hostpath_mounts = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], container_sock_mounts = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], selinux_options = 0 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], hostport_not_used = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], latest_tag = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], log_output = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], specialized_init_system = 0 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], single_process_type = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], zombie_handled = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["microservice", "cert"], sig_term_handled = 100 I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: total_passed: ["microservice", "cert"] = 3 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_max_passed tag: ["microservice", "cert"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name reasonable_image_size D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name specialized_init_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name reasonable_startup_time D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name single_process_type D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name zombie_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name service_discovery D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name shared_database D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["microservice"] name sig_term_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:microservice, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: microservice D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: total_max_passed tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled"] I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: failed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: na I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: failed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: failed tests ["non_root_containers", "specialized_init_system"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name service_discovery D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_latency D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_corruption D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_duplication D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_io_stress D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name operator_installed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name secrets_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_configmap D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name no_local_volume_configuration D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name elastic_volumes D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name linux_hardening D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_file_systems D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name ingress_egress_blocked D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name prometheus_traffic D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name open_metrics D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name routed_logs D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name tracing D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: bonus tasks ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) true D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: tasks x: specialized_init_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_points: task: specialized_init_system is worth: 100 points I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: tasks x: single_process_type D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_points: task: single_process_type is worth: 100 points I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: tasks x: zombie_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_points: task: zombie_handled is worth: 100 points I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: tasks x: sig_term_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_points: task: sig_term_handled is worth: 100 points I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: total_max_passed: ["microservice", "cert"] = 4 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_passed: ["essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name specialized_init_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name single_process_type D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name zombie_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name sig_term_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name increase_decrease_capacity D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name liveness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name readiness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostport_not_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name node_drain D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name privileged_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name non_root_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name cpu_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name memory_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostpath_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name log_output D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name container_sock_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name selinux_options D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name latest_tag D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], increase_decrease_capacity = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], node_drain = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], privileged_containers = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], non_root_containers = 0 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], cpu_limits = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], memory_limits = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], hostpath_mounts = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], container_sock_mounts = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], selinux_options = 0 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], hostport_not_used = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], latest_tag = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], log_output = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], specialized_init_system = 0 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], single_process_type = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], zombie_handled = 100 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], sig_term_handled = 100 I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: total_passed: ["essential"] = 14 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_max_passed tag: ["essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name specialized_init_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name single_process_type D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name zombie_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name sig_term_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name increase_decrease_capacity D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name liveness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name readiness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostport_not_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name node_drain D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name privileged_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name non_root_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name cpu_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name memory_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostpath_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name log_output D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name container_sock_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential Microservice results: 3 of 4 tests passed  Reliability, Resilience, and Availability Tests D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name selinux_options D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name latest_tag D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: total_max_passed tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: failed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: na I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: failed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: failed tests ["non_root_containers", "specialized_init_system"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name service_discovery D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_latency D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_corruption D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_duplication D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_io_stress D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name operator_installed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name secrets_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_configmap D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name no_local_volume_configuration D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name elastic_volumes D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name linux_hardening D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_file_systems D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name ingress_egress_blocked D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name prometheus_traffic D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name open_metrics D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name routed_logs D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name tracing D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: bonus tasks ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) true D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: tasks x: specialized_init_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_points: task: specialized_init_system is worth: 100 points I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: tasks x: single_process_type D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_points: task: single_process_type is worth: 100 points I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: tasks x: zombie_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_points: task: zombie_handled is worth: 100 points I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: tasks x: sig_term_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_points: task: sig_term_handled is worth: 100 points I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: tasks x: increase_decrease_capacity D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_points: task: increase_decrease_capacity is worth: 100 points I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: tasks x: liveness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_points: task: liveness is worth: 100 points I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: tasks x: readiness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_points: task: readiness is worth: 100 points I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: tasks x: hostport_not_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_points: task: hostport_not_used is worth: 100 points I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: tasks x: hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_points: task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: tasks x: node_drain D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_points: task: node_drain is worth: 100 points I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: tasks x: privileged_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_points: task: privileged_containers is worth: 100 points I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) true D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: tasks x: non_root_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_points: task: non_root_containers is worth: 100 points I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: tasks x: cpu_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_points: task: cpu_limits is worth: 100 points I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: tasks x: memory_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_points: task: memory_limits is worth: 100 points I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: tasks x: hostpath_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_points: task: hostpath_mounts is worth: 100 points I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: tasks x: log_output D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_points: task: log_output is worth: 100 points I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: tasks x: container_sock_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_points: task: container_sock_mounts is worth: 100 points I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, selinux_options = 0 status = na I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: tasks x: selinux_options D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, selinux_options = 0 status = na I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: na_assigned for selinux_options I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: tasks x: latest_tag D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, node_drain = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, privileged_containers = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, non_root_containers = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, cpu_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, memory_limits = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, selinux_options = 0 status = na D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, latest_tag = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, log_output = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, single_process_type = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, zombie_handled = 100 status = passed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, sig_term_handled = 100 status = passed I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_points: task: latest_tag is worth: 100 points I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: total_max_passed: ["essential"] = 18 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 100, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "zombie_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}]} D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 300, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "zombie_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}]} D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 300, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "zombie_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}]} D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 300, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "zombie_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}], "maximum_points" => 400} D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_network_latency D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_network_corruption D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_network_duplication D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_delete D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_io_stress D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_memory_hog D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name disk_fill D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_dns_error D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name liveness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name readiness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: task_runner args: # I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: ensure_cnf_installed? true I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: check_cnf_config args: # I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: check_cnf_config cnf: I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [liveness] I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: CNF configs found: 1 D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: single_task_runner args: # "installed_cnf_files/cnf-testsuite.yml"}> I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite-liveness: Starting test D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite-liveness: cnf_config: # I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: cnf_resource_ymls I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: manifest_path_to_ymls file_path: installed_cnf_files/common_manifest.yml I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: manifest_string_to_ymls D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: manifest_string_to_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: cnf_resource_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Deployment D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"} D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Service D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"} D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: {} D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Pod D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ReplicaSet D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: StatefulSet D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: DaemonSet D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ServiceAccount D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: resources: [] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: all resource: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}} D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}} D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite-KubectlClient::Get.resource_volumes: Deployment resource_name: coredns-coredns namespace: cnf-default I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "litmuschaos.io/chaos": "true", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 4, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4962465", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 4, "replicas": 1, "unavailableReplicas": 1, "updatedReplicas": 1 } } I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: kubectl get resource volumes: [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}] D, [2025-03-06 11:58:30 UTC #1422] DEBUG -- cnf-testsuite: kubectl get resource containers kind: Deployment resource_name: coredns-coredns namespace: cnf-default I, [2025-03-06 11:58:30 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default ✔️ 🏆PASSED: [liveness] Helm liveness probe found ⎈🧫 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "litmuschaos.io/chaos": "true", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 4, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4962465", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 4, "replicas": 1, "unavailableReplicas": 1, "updatedReplicas": 1 } } D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: kubectl get resource containers: [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}]}] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite-liveness: Resource Deployment/coredns-coredns passed liveness?: true D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: yield resp: true I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite-KubectlClient::Get.resource_volumes: Service resource_name: coredns-coredns namespace: cnf-default D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: workload resource test intialized: true test_passed: true I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite-liveness: Workload resource task response: true D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: task liveness emoji: ⎈🧫 I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "liveness", "emoji" => "⎈🧫", "tags" => ["resilience", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["resilience", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: resp: ["resilience", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_type x: resilience acc: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: liveness is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: cmd: /usr/local/bin/cnf-testsuite cert I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite-liveness: task_runtime=00:00:00.241281773; start_time=2025-03-06 11:58:30 UTC; end_time:2025-03-06 11:58:31 UTC I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "liveness", "emoji" => "⎈🧫", "tags" => ["resilience", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["resilience", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: resp: ["resilience", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_type x: resilience acc: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: upsert_task: task: liveness has status: passed and is awarded: 100 points. Runtime: 00:00:00.241281773 I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_runner args: # I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: ensure_cnf_installed? true I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: check_cnf_config args: # I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: check_cnf_config cnf: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: cnf_config_list I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: find: find installed_cnf_files/* -name "cnf-testsuite.yml" 🎬 Testing: [readiness] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: find response: ["installed_cnf_files/cnf-testsuite.yml"] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: CNF configs found: 1 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: single_task_runner args: # "installed_cnf_files/cnf-testsuite.yml"}> I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite-readiness: Starting test D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite-readiness: cnf_config: # I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: cnf_resource_ymls I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: manifest_path_to_ymls file_path: installed_cnf_files/common_manifest.yml I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: manifest_string_to_ymls D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: manifest_string_to_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: cnf_resource_ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Deployment D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"} D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Service D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: x[metadata]?: {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"} D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: x[metadata][annotations]?: {} D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: resources: [{"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: Pod D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ReplicaSet D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: StatefulSet D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: DaemonSet D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: resources: [] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: workload_resource_by_kind kind: ServiceAccount D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: workload_resource_by_kind ymls: [{"apiVersion" => "v1", "kind" => "ConfigMap", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "data" => {"Corefile" => ".:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes cluster.local in-addr.arpa ip6.arpa {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus 0.0.0.0:9153\n forward . /etc/resolv.conf\n cache 30\n loop\n reload\n loadbalance\n}"}}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRole", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "rules" => [{"apiGroups" => [""], "resources" => ["endpoints", "services", "pods", "namespaces"], "verbs" => ["list", "watch"]}]}, {"apiVersion" => "rbac.authorization.k8s.io/v1", "kind" => "ClusterRoleBinding", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}}, "roleRef" => {"apiGroup" => "rbac.authorization.k8s.io", "kind" => "ClusterRole", "name" => "coredns-coredns"}, "subjects" => [{"kind" => "ServiceAccount", "name" => "default", "namespace" => "cnf-default"}]}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}, {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: resources: [] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: all resource: [{"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}}, {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}}] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: {"apiVersion" => "apps/v1", "kind" => "Deployment", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "namespace" => "cnf-default"}, "spec" => {"replicas" => 1, "strategy" => {"type" => "RollingUpdate", "rollingUpdate" => {"maxUnavailable" => 1, "maxSurge" => "25%"}}, "selector" => {"matchLabels" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}}, "template" => {"metadata" => {"labels" => {"k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns", "app.kubernetes.io/instance" => "coredns"}, "annotations" => {"checksum/config" => "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod" => "", "scheduler.alpha.kubernetes.io/tolerations" => "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]"}}, "spec" => {"terminationGracePeriodSeconds" => 30, "serviceAccountName" => "default", "dnsPolicy" => "Default", "containers" => [{"name" => "coredns", "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "args" => ["-conf", "/etc/coredns/Corefile"], "volumeMounts" => [{"name" => "config-volume", "mountPath" => "/etc/coredns"}], "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "ports" => [{"containerPort" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"containerPort" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "livenessProbe" => {"httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}, "readinessProbe" => {"httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "timeoutSeconds" => 5, "successThreshold" => 1, "failureThreshold" => 5}}], "volumes" => [{"name" => "config-volume", "configMap" => {"name" => "coredns-coredns", "items" => [{"key" => "Corefile", "path" => "Corefile"}]}}]}}}} D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: cnf_workload_resource yield resp: {"apiVersion" => "v1", "kind" => "Service", "metadata" => {"name" => "coredns-coredns", "labels" => {"app.kubernetes.io/managed-by" => "Helm", "app.kubernetes.io/instance" => "coredns", "helm.sh/chart" => "coredns-1.13.8", "k8s-app" => "coredns", "kubernetes.io/cluster-service" => "true", "kubernetes.io/name" => "CoreDNS", "app.kubernetes.io/name" => "coredns"}, "annotations" => {}, "namespace" => "cnf-default"}, "spec" => {"selector" => {"app.kubernetes.io/instance" => "coredns", "k8s-app" => "coredns", "app.kubernetes.io/name" => "coredns"}, "ports" => [{"port" => 53, "protocol" => "UDP", "name" => "udp-53"}, {"port" => 53, "protocol" => "TCP", "name" => "tcp-53"}], "type" => "ClusterIP"}} D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: resource names: [{kind: "Deployment", name: "coredns-coredns", namespace: "cnf-default"}, {kind: "Service", name: "coredns-coredns", namespace: "cnf-default"}] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite-KubectlClient::Get.resource_volumes: Deployment resource_name: coredns-coredns namespace: cnf-default I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "litmuschaos.io/chaos": "true", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 4, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4962465", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 4, "replicas": 1, "unavailableReplicas": 1, "updatedReplicas": 1 } } I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: kubectl get resource volumes: [{"configMap" => {"defaultMode" => 420, "items" => [{"key" => "Corefile", "path" => "Corefile"}], "name" => "coredns-coredns"}, "name" => "config-volume"}] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: kubectl get resource containers kind: Deployment resource_name: coredns-coredns namespace: cnf-default I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: KubectlClient::Get.resource command: kubectl get Deployment coredns-coredns -o json -n cnf-default ✔️ 🏆PASSED: [readiness] Helm readiness probe found ⎈🧫 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: KubectlClient::Get.resource output: { "apiVersion": "apps/v1", "kind": "Deployment", "metadata": { "annotations": { "deployment.kubernetes.io/revision": "1", "litmuschaos.io/chaos": "true", "meta.helm.sh/release-name": "coredns", "meta.helm.sh/release-namespace": "cnf-default" }, "creationTimestamp": "2025-03-06T11:52:37Z", "generation": 4, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/managed-by": "Helm", "app.kubernetes.io/name": "coredns", "helm.sh/chart": "coredns-1.13.8", "k8s-app": "coredns", "kubernetes.io/cluster-service": "true", "kubernetes.io/name": "CoreDNS" }, "name": "coredns-coredns", "namespace": "cnf-default", "resourceVersion": "4962465", "uid": "489e7e00-25be-4697-9d6f-9e9bc6689c66" }, "spec": { "progressDeadlineSeconds": 600, "replicas": 1, "revisionHistoryLimit": 10, "selector": { "matchLabels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "strategy": { "rollingUpdate": { "maxSurge": "25%", "maxUnavailable": 1 }, "type": "RollingUpdate" }, "template": { "metadata": { "annotations": { "checksum/config": "473c46ef33ae3e2811a84fd13c39de8f09ee48ee3de2e6a155431c511d7838f9", "scheduler.alpha.kubernetes.io/critical-pod": "", "scheduler.alpha.kubernetes.io/tolerations": "[{\"key\":\"CriticalAddonsOnly\", \"operator\":\"Exists\"}]" }, "creationTimestamp": null, "labels": { "app.kubernetes.io/instance": "coredns", "app.kubernetes.io/name": "coredns", "k8s-app": "coredns" } }, "spec": { "containers": [ { "args": [ "-conf", "/etc/coredns/Corefile" ], "image": "coredns/coredns:1.7.1", "imagePullPolicy": "IfNotPresent", "livenessProbe": { "failureThreshold": 5, "httpGet": { "path": "/health", "port": 8080, "scheme": "HTTP" }, "initialDelaySeconds": 60, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "name": "coredns", "ports": [ { "containerPort": 53, "name": "udp-53", "protocol": "UDP" }, { "containerPort": 53, "name": "tcp-53", "protocol": "TCP" } ], "readinessProbe": { "failureThreshold": 5, "httpGet": { "path": "/ready", "port": 8181, "scheme": "HTTP" }, "initialDelaySeconds": 10, "periodSeconds": 10, "successThreshold": 1, "timeoutSeconds": 5 }, "resources": { "limits": { "cpu": "100m", "memory": "128Mi" }, "requests": { "cpu": "100m", "memory": "128Mi" } }, "terminationMessagePath": "/dev/termination-log", "terminationMessagePolicy": "File", "volumeMounts": [ { "mountPath": "/etc/coredns", "name": "config-volume" } ] } ], "dnsPolicy": "Default", "restartPolicy": "Always", "schedulerName": "default-scheduler", "securityContext": {}, "serviceAccount": "default", "serviceAccountName": "default", "terminationGracePeriodSeconds": 30, "volumes": [ { "configMap": { "defaultMode": 420, "items": [ { "key": "Corefile", "path": "Corefile" } ], "name": "coredns-coredns" }, "name": "config-volume" } ] } } }, "status": { "conditions": [ { "lastTransitionTime": "2025-03-06T11:52:37Z", "lastUpdateTime": "2025-03-06T11:52:52Z", "message": "ReplicaSet \"coredns-coredns-64fc886fd4\" has successfully progressed.", "reason": "NewReplicaSetAvailable", "status": "True", "type": "Progressing" }, { "lastTransitionTime": "2025-03-06T11:53:07Z", "lastUpdateTime": "2025-03-06T11:53:07Z", "message": "Deployment has minimum availability.", "reason": "MinimumReplicasAvailable", "status": "True", "type": "Available" } ], "observedGeneration": 4, "replicas": 1, "unavailableReplicas": 1, "updatedReplicas": 1 } } D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: kubectl get resource containers: [{"args" => ["-conf", "/etc/coredns/Corefile"], "image" => "coredns/coredns:1.7.1", "imagePullPolicy" => "IfNotPresent", "livenessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/health", "port" => 8080, "scheme" => "HTTP"}, "initialDelaySeconds" => 60, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "name" => "coredns", "ports" => [{"containerPort" => 53, "name" => "udp-53", "protocol" => "UDP"}, {"containerPort" => 53, "name" => "tcp-53", "protocol" => "TCP"}], "readinessProbe" => {"failureThreshold" => 5, "httpGet" => {"path" => "/ready", "port" => 8181, "scheme" => "HTTP"}, "initialDelaySeconds" => 10, "periodSeconds" => 10, "successThreshold" => 1, "timeoutSeconds" => 5}, "resources" => {"limits" => {"cpu" => "100m", "memory" => "128Mi"}, "requests" => {"cpu" => "100m", "memory" => "128Mi"}}, "terminationMessagePath" => "/dev/termination-log", "terminationMessagePolicy" => "File", "volumeMounts" => [{"mountPath" => "/etc/coredns", "name" => "config-volume"}]}] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite-readiness: Resource Deployment/coredns-coredns passed liveness?: true D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: yield resp: true I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite-KubectlClient::Get.resource_volumes: Service resource_name: coredns-coredns namespace: cnf-default D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: workload resource test intialized: true test_passed: true I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite-readiness: Workload resource task response: true D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: task readiness emoji: ⎈🧫 I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "readiness", "emoji" => "⎈🧫", "tags" => ["resilience", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["resilience", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: resp: ["resilience", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_type x: resilience acc: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: readiness is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: cmd: /usr/local/bin/cnf-testsuite cert I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite-readiness: task_runtime=00:00:00.233367653; start_time=2025-03-06 11:58:31 UTC; end_time:2025-03-06 11:58:31 UTC I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_type_by_task I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: points: {"name" => "readiness", "emoji" => "⎈🧫", "tags" => ["resilience", "dynamic", "workload", "cert", "essential"], "pass" => 100} D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: points tags: ["resilience", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: resp: ["resilience", "dynamic", "workload", "cert", "essential"] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_type x: resilience acc: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_type x: dynamic acc: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_type x: workload acc: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_type x: cert acc: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_type x: essential acc: cert I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_type: essential I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: upsert_task: task: readiness has status: passed and is awarded: 100 points. Runtime: 00:00:00.233367653 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_network_latency D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_network_corruption D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_network_duplication D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_delete D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_io_stress D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_memory_hog D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name disk_fill D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_dns_error D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name liveness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name readiness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], found tasks: ["liveness", "readiness"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], increase_decrease_capacity = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], node_drain = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], privileged_containers = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], non_root_containers = 0 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], cpu_limits = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], memory_limits = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], hostpath_mounts = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], container_sock_mounts = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], selinux_options = 0 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], hostport_not_used = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], latest_tag = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], log_output = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], specialized_init_system = 0 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], single_process_type = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], zombie_handled = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], sig_term_handled = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], liveness = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], readiness = 100 I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: total_points: ["resilience", "cert"] = 200 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_max_points tag: ["resilience", "cert"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_network_latency D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_network_corruption D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_network_duplication D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_delete D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_io_stress D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_memory_hog D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name disk_fill D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_dns_error D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name liveness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name readiness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks - bonus tasks: 2 I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped tests [] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed tests ["non_root_containers", "specialized_init_system"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name service_discovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_latency D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_corruption D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_duplication D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_io_stress D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name operator_installed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name secrets_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_configmap D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name no_local_volume_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name elastic_volumes D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name linux_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_file_systems D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name ingress_egress_blocked D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name prometheus_traffic D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name open_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name routed_logs D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name tracing D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus tasks ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task reduce x: liveness I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: liveness is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task reduce x: readiness I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: readiness is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: total_max_points: ["resilience", "cert"] = 200 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_passed: ["resilience", "cert"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_network_latency D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_network_corruption D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_network_duplication D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_delete D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_io_stress D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_memory_hog D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name disk_fill D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_dns_error D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name liveness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name readiness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], found tasks: ["liveness", "readiness"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], increase_decrease_capacity = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], node_drain = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], privileged_containers = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], non_root_containers = 0 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], cpu_limits = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], memory_limits = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], hostpath_mounts = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], container_sock_mounts = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], selinux_options = 0 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], hostport_not_used = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], latest_tag = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], log_output = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], specialized_init_system = 0 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], single_process_type = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], zombie_handled = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], sig_term_handled = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], liveness = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["resilience", "cert"], readiness = 100 I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: total_passed: ["resilience", "cert"] = 2 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_max_passed tag: ["resilience", "cert"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_network_latency D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_network_corruption D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_network_duplication D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_delete D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_io_stress D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_memory_hog D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name disk_fill D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name pod_dns_error D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name liveness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["resilience"] name readiness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:resilience, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: resilience D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: total_max_passed tasks: ["liveness", "readiness"] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: failed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: na I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: failed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed tests ["non_root_containers", "specialized_init_system"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name service_discovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_latency D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_corruption D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_duplication D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_io_stress D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name operator_installed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name secrets_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_configmap D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name no_local_volume_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name elastic_volumes D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name linux_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_file_systems D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name ingress_egress_blocked D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name prometheus_traffic D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name open_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name routed_logs D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name tracing D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus tasks ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: liveness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: liveness is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: readiness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: readiness is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: total_max_passed: ["resilience", "cert"] = 2 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_passed: ["essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name specialized_init_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name single_process_type D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name zombie_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name sig_term_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name increase_decrease_capacity D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name liveness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name readiness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name node_drain D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name privileged_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name non_root_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name cpu_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name memory_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostpath_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name log_output D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name container_sock_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name selinux_options D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name latest_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], increase_decrease_capacity = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], node_drain = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], privileged_containers = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], non_root_containers = 0 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], cpu_limits = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], memory_limits = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], hostpath_mounts = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], container_sock_mounts = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], selinux_options = 0 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], hostport_not_used = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], latest_tag = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], log_output = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], specialized_init_system = 0 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], single_process_type = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], zombie_handled = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], sig_term_handled = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], liveness = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], readiness = 100 I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: total_passed: ["essential"] = 16 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_max_passed tag: ["essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name specialized_init_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name single_process_type D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name zombie_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name sig_term_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name increase_decrease_capacity D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name liveness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name readiness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name node_drain D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name privileged_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name non_root_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name cpu_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name memory_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostpath_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name log_output D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name container_sock_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name selinux_options D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name latest_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: total_max_passed tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: failed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: na I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: failed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed tests ["non_root_containers", "specialized_init_system"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name service_discovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus Reliability, resilience, and availability results: 2 of 2 tests passed  RESULTS SUMMARY D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_latency D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_corruption D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_duplication D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_io_stress D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name operator_installed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name secrets_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_configmap D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name no_local_volume_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name elastic_volumes D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name linux_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_file_systems D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name ingress_egress_blocked D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name prometheus_traffic D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name open_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name routed_logs D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name tracing D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus tasks ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) true D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: specialized_init_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: specialized_init_system is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: single_process_type D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: single_process_type is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: zombie_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: zombie_handled is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: sig_term_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: sig_term_handled is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: increase_decrease_capacity D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: increase_decrease_capacity is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: liveness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: liveness is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: readiness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: readiness is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: hostport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: hostport_not_used is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: node_drain D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: node_drain is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: privileged_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: privileged_containers is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) true D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: non_root_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: non_root_containers is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: cpu_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: cpu_limits is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: memory_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: memory_limits is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: hostpath_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: hostpath_mounts is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: log_output D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: log_output is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: container_sock_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: container_sock_mounts is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, selinux_options = 0 status = na I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: selinux_options D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, selinux_options = 0 status = na I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned for selinux_options I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: latest_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: latest_tag is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: total_max_passed: ["essential"] = 18 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 300, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "zombie_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "liveness", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "readiness", "status" => "passed", "type" => "essential", "points" => 100}]} D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 200, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "zombie_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "liveness", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "readiness", "status" => "passed", "type" => "essential", "points" => 100}]} D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 200, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "zombie_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "liveness", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "readiness", "status" => "passed", "type" => "essential", "points" => 100}]} D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 200, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "zombie_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "liveness", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "readiness", "status" => "passed", "type" => "essential", "points" => 100}], "maximum_points" => 200} D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], increase_decrease_capacity = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], node_drain = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], privileged_containers = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], non_root_containers = 0 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], cpu_limits = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], memory_limits = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], hostpath_mounts = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], container_sock_mounts = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], selinux_options = 0 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], hostport_not_used = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], latest_tag = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], log_output = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], specialized_init_system = 0 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], single_process_type = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], zombie_handled = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], sig_term_handled = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], liveness = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], readiness = 100 I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: total_points: ["cert"] = 1600 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_max_points tag: ["cert"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks - bonus tasks: 19 I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped tests [] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed tests ["non_root_containers", "specialized_init_system"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name service_discovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_latency D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_corruption D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_duplication D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_io_stress D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name operator_installed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name secrets_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_configmap D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name no_local_volume_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name elastic_volumes D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name linux_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_file_systems D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name ingress_egress_blocked D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name prometheus_traffic D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name open_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name routed_logs D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name tracing D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus tasks ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task reduce x: specialized_init_system I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) true D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: specialized_init_system is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task reduce x: single_process_type I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: single_process_type is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task reduce x: zombie_handled I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: zombie_handled is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task reduce x: sig_term_handled I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: sig_term_handled is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task reduce x: increase_decrease_capacity I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: increase_decrease_capacity is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task reduce x: liveness I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: liveness is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task reduce x: readiness I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: readiness is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task reduce x: hostport_not_used I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: hostport_not_used is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task reduce x: hardcoded_ip_addresses_in_k8s_runtime_configuration I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task reduce x: node_drain I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: node_drain is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task reduce x: privileged_containers I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: privileged_containers is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task reduce x: non_root_containers I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) true D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: non_root_containers is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task reduce x: cpu_limits I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: cpu_limits is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task reduce x: memory_limits I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: memory_limits is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task reduce x: hostpath_mounts I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: hostpath_mounts is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task reduce x: log_output I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: log_output is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task reduce x: container_sock_mounts I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: container_sock_mounts is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task reduce x: selinux_options I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, selinux_options = 0 status = na I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, selinux_options = 0 status = na I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned for selinux_options I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task reduce x: latest_tag I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: latest_tag is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: total_max_points: ["cert"] = 1800 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_passed: ["cert"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], increase_decrease_capacity = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], node_drain = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], privileged_containers = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], non_root_containers = 0 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], cpu_limits = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], memory_limits = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], hostpath_mounts = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], container_sock_mounts = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], selinux_options = 0 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], hostport_not_used = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], latest_tag = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], log_output = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], specialized_init_system = 0 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], single_process_type = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], zombie_handled = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], sig_term_handled = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], liveness = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["cert"], readiness = 100 I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: total_passed: ["cert"] = 16 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_max_passed tag: ["cert"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name specialized_init_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name single_process_type D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name zombie_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name sig_term_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name increase_decrease_capacity D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name liveness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name readiness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name node_drain D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name privileged_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name non_root_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name cpu_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name memory_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name hostpath_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name log_output D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name container_sock_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name selinux_options D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["cert"] name latest_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:cert, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: cert D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: total_max_passed tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: failed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: na I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: failed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed tests ["non_root_containers", "specialized_init_system"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name service_discovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_latency D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_corruption D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_duplication D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_io_stress D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name operator_installed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name secrets_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_configmap D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name no_local_volume_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name elastic_volumes D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name linux_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_file_systems D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name ingress_egress_blocked D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name prometheus_traffic D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name open_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name routed_logs D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name tracing D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus tasks ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) true D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: specialized_init_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: specialized_init_system is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: single_process_type D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: single_process_type is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: zombie_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: zombie_handled is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: sig_term_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: sig_term_handled is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: increase_decrease_capacity D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: increase_decrease_capacity is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: liveness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: liveness is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: readiness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: readiness is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: hostport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: hostport_not_used is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: node_drain D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: node_drain is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: privileged_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: privileged_containers is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) true D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: non_root_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: non_root_containers is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: cpu_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: cpu_limits is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: memory_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: memory_limits is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: hostpath_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: hostpath_mounts is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: log_output D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: log_output is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: container_sock_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: container_sock_mounts is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, selinux_options = 0 status = na I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: selinux_options D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, selinux_options = 0 status = na I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned for selinux_options I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: latest_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: latest_tag is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: total_max_passed: ["cert"] = 18 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_passed: ["essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name specialized_init_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name single_process_type D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name zombie_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name sig_term_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name increase_decrease_capacity D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name liveness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name readiness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name node_drain D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name privileged_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name non_root_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name cpu_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name memory_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostpath_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name log_output D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name container_sock_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name selinux_options D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name latest_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], found tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], increase_decrease_capacity = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], node_drain = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], privileged_containers = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], non_root_containers = 0 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], cpu_limits = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], memory_limits = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], hostpath_mounts = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], container_sock_mounts = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], selinux_options = 0 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], hostport_not_used = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], latest_tag = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], log_output = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], specialized_init_system = 0 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], single_process_type = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], zombie_handled = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], sig_term_handled = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], liveness = 100 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: ["essential"], readiness = 100 I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: total_passed: ["essential"] = 16 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_max_passed tag: ["essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name specialized_init_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name single_process_type D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name zombie_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_discovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name sig_term_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name increase_decrease_capacity D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_latency D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_corruption D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_network_duplication D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_io_stress D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name operator_installed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name liveness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name readiness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name secrets_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_configmap D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name no_local_volume_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name elastic_volumes D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name node_drain D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name privileged_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name non_root_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name linux_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name cpu_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name memory_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name immutable_file_systems D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name hostpath_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ingress_egress_blocked D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name log_output D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_traffic D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name open_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name routed_logs D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name tracing D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name container_sock_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name selinux_options D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["essential"] name latest_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:essential, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: essential D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: total_max_passed tasks: ["specialized_init_system", "single_process_type", "zombie_handled", "sig_term_handled", "increase_decrease_capacity", "liveness", "readiness", "hostport_not_used", "hardcoded_ip_addresses_in_k8s_runtime_configuration", "node_drain", "privileged_containers", "non_root_containers", "cpu_limits", "memory_limits", "hostpath_mounts", "log_output", "container_sock_mounts", "selinux_options", "latest_tag"] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: failed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: na I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: failed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped test_info status: passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed tests ["non_root_containers", "specialized_init_system"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_scoring, points.tags: D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_image_size, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_image_size D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:specialized_init_system, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name specialized_init_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:reasonable_startup_time, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name reasonable_startup_time D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:single_process_type, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name single_process_type D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:zombie_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name zombie_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_discovery, points.tags:["microservice", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name service_discovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:shared_database, points.tags:["microservice", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name shared_database D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sig_term_handled, points.tags:["microservice", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag microservice tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sig_term_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cni_compatible, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cni_compatible D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privilege_escalation, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privilege_escalation D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:symlink_file_system, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name symlink_file_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:application_credentials, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name application_credentials D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_network, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_network D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:increase_decrease_capacity, points.tags:["compatibility", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name increase_decrease_capacity D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_latency, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_latency D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_corruption, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_corruption D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_network_duplication, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_network_duplication D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_delete, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_delete D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_io_stress, points.tags:["resilience", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name pod_io_stress D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_memory_hog, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_memory_hog D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:disk_fill, points.tags:["resilience", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name disk_fill D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:pod_dns_error, points.tags:["resilience", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name pod_dns_error D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:versioned_tag, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name versioned_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ip_addresses, points.tags:["configuration", "static", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag static tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name ip_addresses D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:operator_installed, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name operator_installed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:liveness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name liveness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:readiness, points.tags:["resilience", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name readiness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_update, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_update D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_downgrade, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_downgrade D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rolling_version_change, points.tags:["compatibility", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rolling_version_change D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:rollback, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name rollback D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:nodeport_not_used, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name nodeport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostport_not_used, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hardcoded_ip_addresses_in_k8s_runtime_configuration, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:secrets_used, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name secrets_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_configmap, points.tags:["configuration", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_configmap D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_deploy, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_deploy D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_valid, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_valid D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_chart_published, points.tags:["compatibility", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag compatibility tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_chart_published D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:no_local_volume_configuration, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name no_local_volume_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:elastic_volumes, points.tags:["state", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name elastic_volumes D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:database_persistence, points.tags:["state", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name database_persistence D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_drain, points.tags:["state", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag state tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_drain D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:k8s_conformance, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name k8s_conformance D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:clusterapi_enabled, points.tags:["platform", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name clusterapi_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:worker_reboot_recovery, points.tags:["platform", "platform:resilience", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:resilience tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name worker_reboot_recovery D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oci_compliant, points.tags:["platform", "platform:hardware_and_scheduling", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:hardware_and_scheduling tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oci_compliant D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:control_plane_hardening, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name control_plane_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cluster_admin, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cluster_admin D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:kube_state_metrics, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name kube_state_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:node_exporter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name node_exporter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_adapter, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name prometheus_adapter D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:metrics_server, points.tags:["platform", "platform:observability", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name metrics_server D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:service_account_mapping, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name service_account_mapping D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:privileged_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name privileged_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:non_root_containers, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name non_root_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:host_pid_ipc_privileges, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name host_pid_ipc_privileges D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:linux_hardening, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name linux_hardening D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:cpu_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name cpu_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:memory_limits, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name memory_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:immutable_file_systems, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name immutable_file_systems D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:hostpath_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name hostpath_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:ingress_egress_blocked, points.tags:["security", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name ingress_egress_blocked D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:insecure_capabilities, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name insecure_capabilities D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:sysctls, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name sysctls D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:log_output, points.tags:["observability", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name log_output D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:prometheus_traffic, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name prometheus_traffic D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:open_metrics, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name open_metrics D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:routed_logs, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name routed_logs D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:tracing, points.tags:["observability", "dynamic", "workload", "bonus"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag observability tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag bonus tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match ["bonus"] name tracing D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:alpha_k8s_apis, points.tags:["configuration", "dynamic", "workload"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name alpha_k8s_apis D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:container_sock_mounts, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name container_sock_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:require_labels, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name require_labels D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:helm_tiller, points.tags:["platform", "platform:security", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag platform:security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name helm_tiller D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:external_ips, points.tags:["security", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name external_ips D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:selinux_options, points.tags:["security", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag security tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name selinux_options D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:default_namespace, points.tags:["configuration", "dynamic", "workload", "normal"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag normal tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name default_namespace D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:latest_tag, points.tags:["configuration", "dynamic", "workload", "cert", "essential"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag configuration tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag workload tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag cert tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag essential tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name latest_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:smf_upf_heartbeat, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name smf_upf_heartbeat D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:suci_enabled, points.tags:["5g", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag 5g tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name suci_enabled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tasks_by_tag: tag:bonus, points.name:oran_e2_connection, points.tags:["ran", "dynamic"] D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag ran tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: parsed_tag dynamic tag: bonus D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: tag_match [] name oran_e2_connection I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus tasks ["service_discovery", "pod_network_latency", "pod_network_corruption", "pod_network_duplication", "pod_io_stress", "operator_installed", "secrets_used", "immutable_configmap", "no_local_volume_configuration", "elastic_volumes", "linux_hardening", "immutable_file_systems", "ingress_egress_blocked", "prometheus_traffic", "open_metrics", "routed_logs", "tracing"] I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) true D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: specialized_init_system D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: specialized_init_system, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: specialized_init_system is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: single_process_type D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: single_process_type, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: single_process_type is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: zombie_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: zombie_handled, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: zombie_handled is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: sig_term_handled D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: sig_term_handled, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: sig_term_handled is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: increase_decrease_capacity D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: increase_decrease_capacity, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: increase_decrease_capacity is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: liveness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: liveness, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: liveness is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: readiness D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: readiness, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: readiness is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: hostport_not_used D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostport_not_used, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: hostport_not_used is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: hardcoded_ip_addresses_in_k8s_runtime_configuration D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hardcoded_ip_addresses_in_k8s_runtime_configuration, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: hardcoded_ip_addresses_in_k8s_runtime_configuration is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: node_drain D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: node_drain, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: node_drain is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: privileged_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: privileged_containers, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: privileged_containers is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) true D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: non_root_containers D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: non_root_containers, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: non_root_containers is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: cpu_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: cpu_limits, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: cpu_limits is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: memory_limits D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: memory_limits, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: memory_limits is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: hostpath_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: hostpath_mounts, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: hostpath_mounts is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: log_output D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: log_output, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: log_output is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: container_sock_mounts D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: container_sock_mounts, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: container_sock_mounts is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, selinux_options = 0 status = na I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: selinux_options D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: selinux_options, selinux_options = 0 status = na I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0} I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned for selinux_options I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: bonus_tasks.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: skipped_tests.includes?(x) false I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: failed_tests.includes?(x) false D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, non_root_containers = 0 status = failed  - 16 of 18 total tests passed  - 16 of 18 essential tests passed Results have been saved to results/cnf-testsuite-results-20250306-115252-815.yml D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: na_assigned?(x) I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: tasks x: latest_tag D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, increase_decrease_capacity = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, node_drain = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, privileged_containers = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, non_root_containers = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, cpu_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, memory_limits = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostpath_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, container_sock_mounts = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, selinux_options = 0 status = na D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hostport_not_used = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, hardcoded_ip_addresses_in_k8s_runtime_configuration = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, latest_tag = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, log_output = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, specialized_init_system = 0 status = failed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, single_process_type = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, zombie_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, sig_term_handled = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, liveness = 100 status = passed D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: total_points: latest_tag, readiness = 100 status = passed I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: assigned: I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: task_points: task: latest_tag is worth: 100 points I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: total_max_passed: ["essential"] = 18 D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 200, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "zombie_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "liveness", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "readiness", "status" => "passed", "type" => "essential", "points" => 100}], "maximum_points" => 200} D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 1600, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "zombie_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "liveness", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "readiness", "status" => "passed", "type" => "essential", "points" => 100}], "maximum_points" => 200} D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 1600, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "zombie_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "liveness", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "readiness", "status" => "passed", "type" => "essential", "points" => 100}], "maximum_points" => 200} D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 1600, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "zombie_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "liveness", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "readiness", "status" => "passed", "type" => "essential", "points" => 100}], "maximum_points" => 1800} D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 1600, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "zombie_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "liveness", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "readiness", "status" => "passed", "type" => "essential", "points" => 100}], "maximum_points" => 1800} D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 1600, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "zombie_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "liveness", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "readiness", "status" => "passed", "type" => "essential", "points" => 100}], "maximum_points" => 1800, "total_passed" => "16 of 18"} D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: update_yml results: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 1600, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "zombie_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "liveness", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "readiness", "status" => "passed", "type" => "essential", "points" => 100}], "maximum_points" => 1800, "total_passed" => "16 of 18"} D, [2025-03-06 11:58:31 UTC #1422] DEBUG -- cnf-testsuite: update_yml parsed_new_yml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 1600, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "zombie_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "liveness", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "readiness", "status" => "passed", "type" => "essential", "points" => 100}], "maximum_points" => 1800, "total_passed" => "16 of 18", "essential_passed" => "16 of 18"} I, [2025-03-06 11:58:31 UTC #1422] INFO -- cnf-testsuite: results yaml: {"name" => "cnf testsuite", "testsuite_version" => "v1.4.1", "status" => nil, "command" => "/usr/local/bin/cnf-testsuite cert", "points" => 1600, "exit_code" => 0, "items" => [{"name" => "increase_decrease_capacity", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "node_drain", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "privileged_containers", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "non_root_containers", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "cpu_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "memory_limits", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hostpath_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "container_sock_mounts", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "selinux_options", "status" => "na", "type" => "essential", "points" => 0}, {"name" => "hostport_not_used", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "hardcoded_ip_addresses_in_k8s_runtime_configuration", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "latest_tag", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "log_output", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "specialized_init_system", "status" => "failed", "type" => "essential", "points" => 0}, {"name" => "single_process_type", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "zombie_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "sig_term_handled", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "liveness", "status" => "passed", "type" => "essential", "points" => 100}, {"name" => "readiness", "status" => "passed", "type" => "essential", "points" => 100}], "maximum_points" => 1800, "total_passed" => "16 of 18", "essential_passed" => "16 of 18"} 2025-03-06 11:58:32,599 - functest_kubernetes.cnf_conformance.conformance - WARNING - non_root_containers failed 2025-03-06 11:58:32,600 - functest_kubernetes.cnf_conformance.conformance - WARNING - specialized_init_system failed 2025-03-06 11:58:32,602 - functest_kubernetes.cnf_conformance.conformance - INFO - +-------------------------------------------------------------+----------------+ | NAME | STATUS | +-------------------------------------------------------------+----------------+ | increase_decrease_capacity | passed | | node_drain | passed | | privileged_containers | passed | | non_root_containers | failed | | cpu_limits | passed | | memory_limits | passed | | hostpath_mounts | passed | | container_sock_mounts | passed | | selinux_options | na | | hostport_not_used | passed | | hardcoded_ip_addresses_in_k8s_runtime_configuration | passed | | latest_tag | passed | | log_output | passed | | specialized_init_system | failed | | single_process_type | passed | | zombie_handled | passed | | sig_term_handled | passed | | liveness | passed | | readiness | passed | +-------------------------------------------------------------+----------------+ 2025-03-06 11:58:34,754 - xtesting.ci.run_tests - INFO - Test result: +-----------------------+------------------+------------------+----------------+ | TEST CASE | PROJECT | DURATION | RESULT | +-----------------------+------------------+------------------+----------------+ | cnf_testsuite | functest | 06:13 | PASS | +-----------------------+------------------+------------------+----------------+ 2025-03-06 11:58:35,058 - functest_kubernetes.cnf_conformance.conformance - INFO - cnf-testsuite cnf_uninstall cnf-config=example-cnfs/coredns/cnf-testsuite.yml Successfully uninstalled helm deployment "coredns". All CNF deployments were uninstalled, some time might be needed for all resources to be down. 2025-03-06 11:58:48,359 - functest_kubernetes.cnf_conformance.conformance - INFO - cnf-testsuite uninstall_all cnf-config=example-cnfs/coredns/cnf-testsuite.yml CNF uninstallation skipped. No CNF config found in installed_cnf_files directory.  Uninstalling testsuite helper tools. Testsuite helper tools uninstalled.